1![Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria](https://www.pdfsearch.io/img/ffb3999a15e34996fc7ac9b7c695f8eb.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-09-08 06:00:03
|
---|
2![Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria](https://www.pdfsearch.io/img/ce8466406fbd25fc7b442e9b7fdf909a.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
3![Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of](https://www.pdfsearch.io/img/bd6de5897aca139166f0e14297619ddc.jpg) | Add to Reading ListSource URL: www.ijmetmr.comLanguage: English - Date: 2015-02-13 08:43:06
|
---|
4![Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi](https://www.pdfsearch.io/img/107b082f4c49995820656e26767c0dae.jpg) | Add to Reading ListSource URL: peerj.comLanguage: English - Date: 2015-10-07 04:49:41
|
---|
5![Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.](https://www.pdfsearch.io/img/b89405f27a71cc213c150fabd7d7a6a3.jpg) | Add to Reading ListSource URL: www.rocq.inria.frLanguage: English - Date: 2006-03-23 04:05:33
|
---|
6![DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,](https://www.pdfsearch.io/img/fc12bd0bb4ff254a9d344754377eb82a.jpg) | Add to Reading ListSource URL: www.rocq.inria.frLanguage: English - Date: 2006-03-23 04:05:33
|
---|
7![Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor](https://www.pdfsearch.io/img/4995db2036392a36714bd3ee48ed5b08.jpg) | Add to Reading ListSource URL: www.csc.ncsu.eduLanguage: English - Date: 2015-07-12 13:03:46
|
---|
8![Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai](https://www.pdfsearch.io/img/65a751c891a280aa0f5f9c805c720130.jpg) | Add to Reading ListSource URL: www.rocq.inria.frLanguage: English - Date: 2006-03-23 08:13:04
|
---|
9![LNCSDenial-of-Service Attack Detection Based on Multivariate Correlation Analysis LNCSDenial-of-Service Attack Detection Based on Multivariate Correlation Analysis](https://www.pdfsearch.io/img/1223ff30672d776edad477e15bb41323.jpg) | Add to Reading ListSource URL: eprints.eemcs.utwente.nl- Date: 2014-11-26 09:04:06
|
---|
10![Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼ Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼](https://www.pdfsearch.io/img/eaf8ea5a3967adda296ab298175abf22.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2005-10-14 10:29:32
|
---|