Crypto and Security-lup-obsolete
11 – 20 of 69
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2013
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Advances in Cryptology -- EUROCRYPT 2013
Johansson, Thomas LU and Phong Q., Nguyen (2013)
- Book/Report › Anthology (editor)
- 2012
-
Mark
Analysis of Malicious and Benign Android Applications
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
Advances in Cryptology--EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques
- Book/Report › Anthology (editor)
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On The Distribution of Linear Biases: Three Instructive Examples
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding