Results 201 to 210 of about 1,042,587 (227)
Some of the next articles are maybe not open access.

Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks

International Conference on Applied Cryptography and Network Security, 2018
S. Vaudenay, Damian Vizár
semanticscholar   +1 more source

The CAESAR-API in the real world — Towards a fair evaluation of hardware CAESAR candidates

IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Michael Tempelmeier   +3 more
semanticscholar   +1 more source

Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)

IACR Cryptology ePrint Archive, 2019
Kenneth Koon-Ho Wong   +3 more
semanticscholar   +1 more source

Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ

Australasian Conference on Information Security and Privacy, 2016
N. Bagheri, Florian Mendel, Yu Sasaki
semanticscholar   +1 more source

Collision Attacks on CAESAR Second-Round Candidate: ELmD

Information Security Practice and Experience, 2016
Jian Zhang, Wenling Wu, Yafei Zheng
semanticscholar   +1 more source

Modelling the decadal dynamics of reach‐scale river channel evolution and floodplain turnover in CAESAR‐Lisflood

Earth Surface Processes and Landforms, 2020
Christopher J Feeney   +2 more
exaly  

Home - About - Disclaimer - Privacy