Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 37
1.
  • The Block Cipher Companion The Block Cipher Companion
    Knudsen, Lars R 2011, 20111011, 2011-04-09
    eBook

    This volume provides a detailed account of block cipher analysis, design, and deployment. The authors describe the most prominent block ciphers and give insights into their design.
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
2.
  • PRINTcipher: A Block Cipher... PRINTcipher: A Block Cipher for IC-Printing
    Knudsen, Lars; Leander, Gregor; Poschmann, Axel ... Cryptographic Hardware and Embedded Systems, CHES 2010
    Book Chapter
    Recenzirano
    Odprti dostop

    In this paper we consider some cryptographic implications of integrated circuit (IC) printing. While still in its infancy, IC-printing allows the production and personalisation of circuits at very ...
Celotno besedilo

PDF
3.
  • Good Variants of HB +  Are ... Good Variants of HB +  Are Hard to Find
    Gilbert, Henri; Robshaw, Matthew J. B; Seurin, Yannick Financial Cryptography and Data Security 5143
    Book Chapter
    Recenzirano
    Odprti dostop

    The strikingly simple HB +  protocol of Juels and Weis 11 has been proposed for the authentication of low-cost RFID tags. As well as being computationally efficient, the protocol is accompanied by an ...
Celotno besedilo

PDF
4.
  • How to Encrypt with the LPN... How to Encrypt with the LPN Problem
    Gilbert, Henri; Robshaw, Matthew J. B; Seurin, Yannick Automata, Languages and Programming 5126
    Book Chapter
    Recenzirano

    We present a probabilistic private-key encryption scheme named LPN-C whose security can be reduced to the hardness of the Learning from Parity with Noise (LPN) problem. The proposed protocol involves ...
Celotno besedilo
5.
Celotno besedilo

PDF
6.
  • Lightweight Cryptography an... Lightweight Cryptography and RFID: Tackling the Hidden Overhead
    Poschmann, Axel; Robshaw, Matthew J.B; Vater, Frank ... KSII transactions on Internet and information systems, 04/2010, Letnik: 4, Številka: 2
    Journal Article
    Recenzirano

    The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a ...
Celotno besedilo
Dostopno za: UL
7.
  • Algebraic Aspects of the Ad... Algebraic Aspects of the Advanced Encryption Standard
    Cid, Carlos; Murphy, Sean; Robshaw, Matthew 2006
    eBook

    The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government's National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
8.
  • Securing RSA-KEM via the AES Securing RSA-KEM via the AES
    Jonsson, Jakob; Robshaw, Matthew J. B. Lecture notes in computer science, 2005
    Book Chapter, Conference Proceeding
    Recenzirano
    Odprti dostop

    RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogonal to the RSA-KEM ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
9.
  • On Unbiased Linear Approxim... On Unbiased Linear Approximations
    Etrog, Jonathan; Robshaw, Matthew J. B. Information Security and Privacy
    Book Chapter
    Recenzirano

    In this paper we explore the recovery of key information from a block cipher when using unbiased linear approximations of a certain form. In particular we develop a theoretical framework for their ...
Celotno besedilo
10.
  • New Stream Cipher Designs New Stream Cipher Designs
    Robshaw, Matthew; Billet, Olivier 2008, 2008-06-19, Letnik: 4986
    eBook

    This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
1 2 3 4
zadetkov: 37

Nalaganje filtrov