1–20 of 64 hits

Sort by: Relevancy | Date newest | Title A-Z

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5

    Sasaki, Yu / Wang, Lei | Tema Archive | 2014
    Keywords: Datenintegrität
  2.  

    An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl

    Sasaki, Yu / Tokushige, Yuuki / Wang, Lei et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  3.  

    Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks

    Sasaki, Yu / Wang, Lei | Springer Verlag | 2014
    Keywords: Systems and Data Security
  4.  

    Comprehensive Study of Integral Analysis on 22-Round LBlock

    Sasaki, Yu / Wang, Lei | Springer Verlag | 2013
    Keywords: Systems and Data Security
  5.  

    Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds

    Guo, Jian / Sasaki, Yu / Wang, Lei et al. | Springer Verlag | 2015
    Keywords: Systems and Data Security
  6.  

    Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5

    Sasaki, Yu / Wang, Lei | Springer Verlag | 2014
    Keywords: Systems and Data Security
  7.  

    Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties

    Koyama, Takuma / Sasaki, Yu / Kunihiro, Noboru | Springer Verlag | 2013
    Keywords: Systems and Data Security
  8.  

    Updates on Generic Attacks against HMAC and NMAC

    Guo, Jian / Peyrin, Thomas / Sasaki, Yu et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  9.  

    Security patterns: a method for constructing secure and efficient inter-company coordination systems

    Yoshioka, N. / Honiden, S. / Finkelstein, A. | Tema Archive | 2004
    Keywords: Datensicherheit
  10.  

    Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher

    Nakasone, Toshiki / Li, Yang / Sasaki, Yu et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  11.  

    Erratum: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks

    Sasaki, Yu / Wang, Lei / Wu, Shuang et al. | Springer Verlag | 2012
    Keywords: Systems and Data Security
  12.  

    Analysis of the CAESAR Candidate Silver

    Jean, Jérémy / Sasaki, Yu / Wang, Lei | Springer Verlag | 2016
    Keywords: Systems and Data Security
  13.  

    A New Mode of Operation for Incremental Authenticated Encryption with Associated Data

    Sasaki, Yu / Yasuda, Kan | Springer Verlag | 2016
    Keywords: Systems and Data Security
  14.  

    Practical Cryptanalysis of PAES

    Jean, Jérémy / Nikolić, Ivica / Sasaki, Yu et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  15.  

    A New Strategy for Finding a Differential Path of SHA-1

    Yajima, Jun / Sasaki, Yu / Naito, Yusuke et al. | Springer Verlag | 2007
    Keywords: Systems and Data Security
  16.  

    Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications

    Sasaki, Yu | Springer Verlag | 2014
    Keywords: Systems and Data Security
  17.  

    Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections

    Sasaki, Yu / Li, Yang / Sakamoto, Hikaru et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  18.  

    Meet-in-the-Middle Attacks on Generic Feistel Constructions

    Guo, Jian / Jean, Jérémy / Nikolić, Ivica et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  19.  

    Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers

    Sasaki, Yu / Wang, Lei | Springer Verlag | 2013
    Keywords: Systems and Data Security
  20.  

    Message Extension Attack against Authenticated Encryptions: Application to PANDA

    Sasaki, Yu / Wang, Lei | Springer Verlag | 2014
    Keywords: Systems and Data Security

Number of results: 10 | 20 | 50

Feedback