يعرض 1 - 20 نتائج من 448 نتيجة بحث عن '"Slide attack"', وقت الاستعلام: 0.47s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3

    المصدر: 名古屋学院大学論集 医学・健康科学・スポーツ科学篇 = THE NAGOYA GAKUIN DAIGAKU RONSHU; Journal of Nagoya Gakuin University; MEDICAL, HEALTH, and SPORTS SCIENCES. 10(1):13-23

  4. 4
    Conference

    المساهمون: Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS), Security, Cryptology and Transmissions (SECRET), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Matthew Robshaw, Jonathan Katz

    المصدر: Crypto 2016 - 36th Annual International Cryptology Conference ; https://hal.inria.fr/hal-01404196 ; Crypto 2016 - 36th Annual International Cryptology Conference, Aug 2016, Santa Barbara, United States. pp.207-237, ⟨10.1007/978-3-662-53008-5_8⟩ ; https://www.iacr.org/conferences/crypto2016/

    جغرافية الموضوع: Santa Barbara, United States

    Relation: info:eu-repo/semantics/altIdentifier/arxiv/1602.05973; hal-01404196; https://hal.inria.fr/hal-01404196; https://hal.inria.fr/hal-01404196/document; https://hal.inria.fr/hal-01404196/file/Simon_CR16.pdf; ARXIV: 1602.05973

  5. 5
    Book

    المساهمون: Daras, N J, Rassias, M T

    المصدر: Computation, cryptography, and network security

    وصف الملف: application/pdf

    Relation: https://eprints.qut.edu.au/92746/1/Springer.pdf; https://rdcu.be/djIpc; Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2015) Flaws in the initialisation process of stream ciphers. In Daras, N J & Rassias, M T (Eds.) Computation, cryptography, and network security. Springer, Switzerland, pp. 19-49.; https://eprints.qut.edu.au/92746/; Institute for Future Environments; Science & Engineering Faculty

  6. 6
  7. 7
    Book

    المساهمون: Wysocki, B J, Wysocki, T A

    المصدر: Proceedings of the 6th International Conference on Signal Processing and Communication Systems

    وصف الملف: application/pdf

    Relation: https://eprints.qut.edu.au/57427/1/a13-alhamdan.pdf; Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2012) Slide attacks on the Sfinks stream cipher. In Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 6th International Conference on Signal Processing and Communication Systems. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-10.; https://eprints.qut.edu.au/57427/; Institute for Future Environments; Science & Engineering Faculty

  8. 8
  9. 9
    Report
  10. 10
    Report
  11. 11
    Academic Journal
  12. 12
    Report

    المساهمون: Indian Statistical Institute Kolkata, Nanyang Technological University Singapour, Computer Security and Industrial Cryptography KU Leuven (ESAT-COSIC), Department of Electrical Engineering KU Leuven (KU-ESAT), Catholic University of Leuven = Katholieke Universiteit Leuven (KU Leuven)-Catholic University of Leuven = Katholieke Universiteit Leuven (KU Leuven), Security, Cryptology and Transmissions (SECRET), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Inria Paris Rocquencourt, ANR-11-INSE-0011,BLOC,Conception et analyse de chiffrements par blocs(2011)

    المصدر: https://inria.hal.science/hal-01241075 ; [Research Report] Inria Paris Rocquencourt. 2015.

  13. 13
    Academic Journal
  14. 14
    Academic Journal
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20