Crypto and Security-lup-obsolete
1 – 10 of 69
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2015
-
Mark
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality
2015) 1st Workshop on Wearable Security and Privacy, Financial Crypto In Lecture Notes in Computer Science 8976. p.261-273(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A New Algorithm for Solving Ring-LPN With a Reducible Polynomial
(
- Contribution to journal › Article
-
Mark
A generalized birthday approach for efficiently finding linear relations in l-sequences
(
- Contribution to journal › Article
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards Bridging the Gap Between Dalvik Bytecode and Native Code During Static Analysis of Android Applications
2015) International Wireless Communications and Mobile Computing Conference 2015(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
-
Mark
Using TPM Secure Storage in Trusted High Availability Systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
Cryptanalysis of Selected Stream Ciphers
(
- Thesis › Doctoral thesis (monograph)