101 – 110 of 168
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2005
-
Mark
Some attacks on the Bit-search generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast computation of large distributions and its cryptographic applications
(
- Contribution to journal › Article
-
Mark
Snow 2.0 IP core for trusted hardware
2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes
2005)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Balancing BlockRAM and distributed RAM
2005) Swedish System-on-Chip Conference (SSoCC'05)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2004
-
Mark
An improved correlation attack on A5/1
2004) Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers In Lecture Notes in Computer Science 3357. p.1-18(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new simple technique to attack filter generators and related ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks using a new class of weak feedback polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A memory-efficient optimal APP symbol-elecoding algorithm for linear block codes
(
- Contribution to journal › Article
-
Mark
New constructions of resilient and correlation immune Boolean functions achieving the upper bound on nonlinearity
(
- Contribution to journal › Article