Search Result
Proceedings Searching for "the"
- Applied Cryptography and Network Security, MergeMAC, A MAC for Authentication with Strict Time Constraints and Limited Bandwidth
- Applied Cryptography and Network Security, On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography
- Applied Cryptography and Network Security, On the Security Notions for Homomorphic Signatures
- Applied Cryptography and Network, A Novel GPU-Based Implementation of the Cube Attack Preliminary Results Against Trivium
- Applied Cryptography and Network, A Practical Chosen Message Power Analysis Approach Against Ciphers with the key Whitening Layers
- Applied Cryptography and Network, An Experimental Study of the BDD Approach for the Search LWE Problem
- Applied Cryptography and Network, Are You Lying, Validating the Time-Location of Outdoor Images
- Applied Cryptography and Network, Breaking and Fixing Mobile App Authentication with OAuth2.O-based Protocols
- Applied Cryptography and Network, Legacy-Compliant Data Authentication for Industrial Control System Traffic
- Applied Cryptography and Network, No Free Charge Theorem, A Covert Channel via USB Charging Cable on Mobile Devices