Results 301 to 310 of about 10,030,622 (339)
Some of the next articles are maybe not open access.

Generic Differential Key Recovery Attacks and Beyond

IACR Cryptology ePrint Archive
Ling Song   +5 more
semanticscholar   +1 more source

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

Journal of Cryptology
Qianqian Yang   +7 more
semanticscholar   +1 more source

Keys to recovery

The Lancet Psychiatry, 2015
openaire   +1 more source

Key escrow becomes key recovery

Network Security, 1996
openaire   +1 more source

Review of thermoelectric generation for internal combustion engine waste heat recovery

Progress in Energy and Combustion Science, 2022
Nicolae Vlad Burnete   +2 more
exaly  

Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT

International Conference on the Theory and Application of Cryptographic Techniques, 2020
Antonio Flórez-Gutiérrez   +1 more
semanticscholar   +1 more source

A Practical Key-Recovery Attack on 805-Round Trivium

IACR Cryptology ePrint Archive, 2020
Chen-Dong Ye, Tian Tian
semanticscholar   +1 more source

Charge-transfer materials for electrochemical water desalination, ion separation and the recovery of elements

Nature Reviews Materials, 2020
Pattarachai Srimuk, Xiao Su, Jeyong Yoon
exaly  

Home - About - Disclaimer - Privacy