Crypto and Security-lup-obsolete
21 – 30 of 69
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2012
-
Mark
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
2012) The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some results on fast algebraic attacks and higher-order non-linearities
(
- Contribution to journal › Article
-
Mark
On Some Symmetric Lightweight Cryptographic Designs
2012)(
- Thesis › Doctoral thesis (monograph)
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article
-
Mark
Some instant- and practical-time related-key attacks on KTANTAN32/48/64
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials
(
- Contribution to journal › Article
- 2011
-
Mark
Searching for new convolutional codes using the cell broadband engine architecture
(
- Contribution to journal › Article
-
Mark
Foveating instructional videos based on experts’ eye movements to teach perception and interpretation of dynamic scenes
2011) 16th European Conference on Eye Movements, ECEM, 2011 In Journal of Eye Movement Research 4(3). p.282-282(
- Contribution to journal › Published meeting abstract
-
Mark
Grain-128a: a new version of Grain-128 with optional authentication
(
- Contribution to journal › Article
-
Mark
A Technique for Remote Detection of Certain Virtual Machine Monitors
2011) The Third International Conference on Trusted Systems, INTRUST 2011 In Lecture Notes in Computer Science 7222. p.129-137(
- Chapter in Book/Report/Conference proceeding › Book chapter