Crypto and Security-lup-obsolete
1 – 10 of 69
                - show: 10
 - |
 - sort: year (new to old)
 
        Close
        
            
    
        Embed this list
<iframe src=""
              width=""
              height=""
              allowtransparency="true"
              frameborder="0">
            </iframe>
        - 2015
 - 
                        Mark
        A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
    
    
- Contribution to journal › Article
 
 - 
                        Mark
        Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
    (2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
 - 
                        Mark
        A generalized birthday approach for efficiently finding linear relations in l-sequences
    
    
- Contribution to journal › Article
 
 - 
                        Mark
        Towards Bridging the Gap Between Dalvik Bytecode and Native Code During Static Analysis of Android Applications
    (2015) International Wireless Communications and Mobile Computing Conference 2015
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
 - 
                        Mark
        Coded-BKW: Solving LWE Using Lattice Codes.
    
    
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
 - 2014
 - 
                        Mark
        Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
    
    
- Contribution to journal › Article
 
 - 
                        Mark
        Using TPM Secure Storage in Trusted High Availability Systems
    
    
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
 - 
                        Mark
        eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
    (2014)
- Book/Report › Report
 
 - 
                        Mark
        eavesROP: Listening for ROP Payloads in Data Streams
    
    
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
 - 2013
 - 
                        Mark
        Cryptanalysis of Selected Stream Ciphers
    
    
- Thesis › Doctoral thesis (monograph)
 
 
