
Corona virus: Access only with medical mouth-nose protection, limited access to reading rooms
Please respect the known hygiene rules and prevent long stays in the library!
► More information about opening hours and visiting the library you find in our FAQ
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Tema Archive | 2014|Keywords: Datenintegrität -
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl
Springer Verlag | 2014|Keywords: Systems and Data Security -
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Springer Verlag | 2014|Keywords: Systems and Data Security -
Comprehensive Study of Integral Analysis on 22-Round LBlock
Springer Verlag | 2013|Keywords: Systems and Data Security -
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Springer Verlag | 2015|Keywords: Systems and Data Security -
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Springer Verlag | 2014|Keywords: Systems and Data Security -
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Springer Verlag | 2013|Keywords: Systems and Data Security -
Updates on Generic Attacks against HMAC and NMAC
Springer Verlag | 2014|Keywords: Systems and Data Security -
Security patterns: a method for constructing secure and efficient inter-company coordination systems
Tema Archive | 2004|Keywords: Datensicherheit -
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Springer Verlag | 2013|Keywords: Systems and Data Security -
Erratum: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks
Springer Verlag | 2012|Keywords: Systems and Data Security -
Analysis of the CAESAR Candidate Silver
Springer Verlag | 2016|Keywords: Systems and Data Security -
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
Springer Verlag | 2016|Keywords: Systems and Data Security -
A New Strategy for Finding a Differential Path of SHA-1
Springer Verlag | 2007|Keywords: Systems and Data Security -
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications
Springer Verlag | 2014|Keywords: Systems and Data Security -
Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections
Springer Verlag | 2013|Keywords: Systems and Data Security -
Meet-in-the-Middle Attacks on Generic Feistel Constructions
Springer Verlag | 2014|Keywords: Systems and Data Security -
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
Springer Verlag | 2013|Keywords: Systems and Data Security -
Message Extension Attack against Authenticated Encryptions: Application to PANDA
Springer Verlag | 2014|Keywords: Systems and Data Security