Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
function attacking » functions attacking, function tracking, function making
parallel function » parallel functional, parallel auction, parallel union
functionals code » functional code, functionals one, functionals some
code https » care https, body https, models https
attacking functionals » attaining functionals, attaining fuctionals, teaching functional
function attacking » functions attacking, function tracking, function making
parallel function » parallel functional, parallel auction, parallel union
functionals code » functional code, functionals one, functionals some
code https » care https, body https, models https
1
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
2
Published 2010
Table of Contents:
“... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“... to Algebraic Attacks on Stream Ciphers -- On the Non-linearity and Sparsity of Boolean Functions Related...”View full text
Electronic
eBook
4
Published 2005
Table of Contents:
“... and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way Hash Functions...”View full text
Electronic
eBook
5
Published 2015
Table of Contents:
“... from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Functions over Ring Z p -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences...”View full text
Electronic
eBook
7
Published 2008
Table of Contents:
“... on the Arithmetic Correlation of Sequences -- A Class of Nonbinary Codes and Sequence Families -- Results...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... of Trivium -- Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... of Asynchronous Automata -- Conjugacy and Equivalence of Weighted Automata and Functional Transducers...”View full text
Electronic
eBook
10
Published 2007
Table of Contents:
“... -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT...”View full text
Electronic
eBook
11
Published 2005
Table of Contents:
“... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...”View full text
Electronic
eBook
12
Published 2012
Table of Contents:
“... Defense Against Insect Herbivore Attack -- Volatiles Mediating Information Between Bacteria and Plants...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... for Elliptic Curves -- Efficient Pairing Computation with Theta Functions -- Small-Span Characteristic...”View full text
Electronic
eBook
15
Published 2010
Table of Contents:
“... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... with Parallel Rewriting for Chain Code Picture Languages -- Base-Complexity Classifications of QCB0-Spaces...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... Environment -- Vulnerability Evaluation of Multiplexing PUF for SVM Attacks -- Autonomous Visualization...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...”View full text
Electronic
eBook
20
Published 2015
Table of Contents:
“... for Probability Density Functions -- Segment Abstraction for Worst-Case Execution Time Analysis -- Automatic...”View full text
Electronic
eBook



