Year of publication
Type of media
Subject
Type of material
Licence
Synonyms were used for: Sicherheit
Search without synonyms: keywords:(Sicherheit)
Used synonyms:
- safety
- security
-
Meet-in-the-Middle Attacks on Generic Feistel Constructions
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
A Simplified Representation of AES
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Beyond 2^c^/^2 Security in Sponge-Based Authenticated Encryption Modes
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
An Increasing Need for Formality (Invited Talk)
Free accessDataCite | 2019|Keywords: Security and privacy → Formal methods and theory of security, Security and privacy → Security in hardware, Hardware security -
Mersenne Factorization Factory
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Bivariate Polynomials Modulo Composites and Their Applications
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Black-Box Separations for Differentially Private Protocols
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary Input
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
XLS is Not a Strong Pseudorandom Permutation
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Actively Secure Private Function Evaluation
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Multi-valued Byzantine Broadcast: The t < n Case
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Higher-Order Threshold Implementations
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
How to Securely Release Unverified Plaintext in Authenticated Encryption
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security -
Bootstrapping Obfuscators via Fast Pseudorandom Functions
British Library Conference Proceedings | 2014|Keywords: Computer security, Information security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.