Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
constructability methods » constructivist methods, constructability factors, construction methods
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
constructability methods » constructivist methods, constructability factors, construction methods
functionality security » functionality securing, functional security, functionality usability
https functionality » its functionality, bags functionality, cross functionality
1
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
Table of Contents:
“... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...”Published 2014
View full text
Electronic
eBook
2
Table of Contents:
“...Chap. 1, Introduction -- Chap. 2, Basics of Practically Efficient Secure Function Evaluation...”
View full text
View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... Cryptosystems -- Constructions of Almost Resilient Functions -- Privacy and Tracing -- A Novel Method...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... -- Cryptographic Foundations -- Construction of Resilient Functions with Multiple Cryptographic Criteria...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...”View full text
Electronic
eBook
7
Published 2007
Table of Contents:
“... -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical...”View full text
Electronic
eBook
8
Published 2013
Table of Contents:
“... Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... Attacks on the One-Way Function Tree (OFT) Scheme -- Bayesian Methods for Practical Traitor Tracing...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“... or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... -- Generic Security-Amplifying Methods of Ordinary Digital Signatures -- New Differential-Algebraic Attacks...”View full text
Electronic
eBook
13
Published 2015
Table of Contents:
“... (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E...”View full text
Electronic
eBook
14
Published 2013
Table of Contents:
“... -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... -- A Method for Improving the Precision and Coverage of Atomicity Violation Predictions...”View full text
Electronic
eBook
16
Published 2008
Table of Contents:
“...: An Experiment of Formal Methods -- Correct Channel Passing by Construction -- Semantics -- A Process Semantics...”View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“... and Environmental Security: The Dietary Grape Polyphenol Concentrate Enoant as Functional Food in Prevention...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“...ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A...”View full text
Electronic
eBook
19
Published 2008
Table of Contents:
“...-Service Construction -- Applications of Formal Approaches to Service-Oriented Computing -- A Use-Case...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... -- Formal Languages and Methods for Designing and Verifying Complex Embedded Systems -- Thematic Track...”View full text
Electronic
eBook



