1
Published 2005
Table of Contents: ... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ... to Algebraic Attacks on Stream Ciphers -- On the Non-linearity and Sparsity of Boolean Functions Related...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way Hash Functions...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ... Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences...
View full text
Electronic eBook
7
Published 2008
Table of Contents: ... on the Arithmetic Correlation of Sequences -- A Class of Nonbinary Codes and Sequence Families -- Results...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... of Asynchronous Automata -- Conjugacy and Equivalence of Weighted Automata and Functional Transducers...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... Defense Against Insect Herbivore Attack -- Volatiles Mediating Information Between Bacteria and Plants...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... for Elliptic Curves -- Efficient Pairing Computation with Theta Functions -- Small-Span Characteristic...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
View full text
Electronic eBook
16
Published 2015
Table of Contents: ... with Parallel Rewriting for Chain Code Picture Languages -- Base-Complexity Classifications of QCB0-Spaces...
View full text
Electronic eBook
17
Published 2015
Table of Contents: ... Environment -- Vulnerability Evaluation of Multiplexing PUF for SVM Attacks -- Autonomous Visualization...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...
View full text
Electronic eBook
20
Published 2015
Table of Contents: ... for Probability Density Functions -- Segment Abstraction for Worst-Case Execution Time Analysis -- Automatic...
View full text
Electronic eBook