31 – 40 of 78
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
(2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
- Contribution to journal › Article
-
Mark
The Efficiency of Optimal Sampling in the Random S-box Model
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
(2014)
- Book/Report › Report
- 2013
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
(2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444
- Contribution to journal › Article
-
Mark
A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
A Survey on Fast Correlation Attacks
- Contribution to journal › Scientific review
-
Mark
Improved distinguishers for HC-128
- Contribution to journal › Article
