131![The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email: The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:](https://www.pdfsearch.io/img/dff6c88ac52705d7d2b9a80616f8fa04.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2014-06-30 10:38:30
|
---|
132![Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan. Cryptanalysis of HMAC/NMAC-Whirlpool Jian Guo1 , Yu Sasaki2 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore. NTT Secure Platform Laboratories, Japan.](https://www.pdfsearch.io/img/61cb33b3c7f2c22f02dd48c26e915924.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-02-23 10:32:52
|
---|
133![When cryptanalysis meets side-channel Alex Biryukov and Dmitry Khovratovich University of Luxembourg When cryptanalysis meets side-channel Alex Biryukov and Dmitry Khovratovich University of Luxembourg](https://www.pdfsearch.io/img/aab6524174df79bf0bc17f59af56d12a.jpg) | Add to Reading ListSource URL: fse2007.uni.luLanguage: English - Date: 2007-05-23 09:25:59
|
---|
134![Cryptanalysis of Provably Secure Certificateless Short Signature Scheme Jayaprakash Kar Information Security Research Group Department of Information Systems Faculty of Computing & Information Technology Cryptanalysis of Provably Secure Certificateless Short Signature Scheme Jayaprakash Kar Information Security Research Group Department of Information Systems Faculty of Computing & Information Technology](https://www.pdfsearch.io/img/fa28ff6e053cb3b8130c6abc32405fac.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-09-24 03:53:31
|
---|
135![Cryptanalysis of Crypto-1 Karsten Nohl University of Virginia The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tickets, and various other security-related a Cryptanalysis of Crypto-1 Karsten Nohl University of Virginia The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tickets, and various other security-related a](https://www.pdfsearch.io/img/74b6c1d5ae58c665b4a60927ba203fb5.jpg) | Add to Reading ListSource URL: www.proxmark.orgLanguage: English - Date: 2008-05-28 17:10:10
|
---|
136![Parallel Cryptanalysis Ruben Niederhagen
Parallel Cryptanalysis Parallel Cryptanalysis Ruben Niederhagen
Parallel Cryptanalysis](https://www.pdfsearch.io/img/48939fe5656967771c55f77fdf5de25f.jpg) | Add to Reading ListSource URL: polycephaly.orgLanguage: English - Date: 2012-06-13 05:19:00
|
---|
137![Cryptanalysis of a White Box AES Implementation Olivier Billet, Henri Gilbert, and Charaf Ech-Chatbi? France T´el´ecom R&D 38–40, rue du G´en´eral LeclercIssy les Moulineaux Cedex 9 — France Cryptanalysis of a White Box AES Implementation Olivier Billet, Henri Gilbert, and Charaf Ech-Chatbi? France T´el´ecom R&D 38–40, rue du G´en´eral LeclercIssy les Moulineaux Cedex 9 — France](https://www.pdfsearch.io/img/b45f57df80afbc290bc20530a303451d.jpg) | Add to Reading ListSource URL: bo.blackowl.orgLanguage: English - Date: 2015-11-14 11:55:15
|
---|
138![Improved Meet-in-the-Middle Cryptanalysis of KTANTAN Lei Wei1 , Christian Rechberger2 , Jian Guo3 , Hongjun Wu1 , Huaxiong Wang1 , and San Ling1 2 1 Improved Meet-in-the-Middle Cryptanalysis of KTANTAN Lei Wei1 , Christian Rechberger2 , Jian Guo3 , Hongjun Wu1 , Huaxiong Wang1 , and San Ling1 2 1](https://www.pdfsearch.io/img/70ee1d1b2d853e3818c3389246f8c688.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-04-27 04:16:45
|
---|
139![Cryptanalysis of FORK-256 ? Thomas Peyrin and Olivier Billet France T´el´ecom R&D Cryptanalysis of FORK-256 ? Thomas Peyrin and Olivier Billet France T´el´ecom R&D](https://www.pdfsearch.io/img/93e5e8ed6b30f7e3115d187984aaadb9.jpg) | Add to Reading ListSource URL: bo.blackowl.orgLanguage: English - Date: 2015-11-14 11:55:14
|
---|
140![Hardware-Based Cryptanalysis of the GSM A5/1 Encryption Algorithm Hardware-Based Cryptanalysis of the GSM A5/1 Encryption Algorithm](https://www.pdfsearch.io/img/227f8211d3ab6e079fcd59deb76db8a1.jpg) | Add to Reading ListSource URL: www.emsec.rub.deLanguage: English - Date: 2010-04-20 22:07:08
|
---|