Year of publication
Subject
Type of material
Language
Synonyms were used for: Datensicherheit
Search without synonyms: keywords:(Datensicherheit)
Used synonyms:
- data integrity
- data security
- datenintegritat
- datensicherung
- security of data
-
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Tema Archive | 2014|Keywords: Datenintegrität -
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR
TIBKAT | 2022|Keywords: Datensicherung -
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl
Springer Verlag | 2014|Keywords: Systems and Data Security -
A technique of phase shift watermarking against overwriting attacks
Tema Archive | 1999|Keywords: Datensicherheit -
Comprehensive Study of Integral Analysis on 22-Round LBlock
Springer Verlag | 2013|Keywords: Systems and Data Security -
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
Springer Verlag | 2018|Keywords: Systems and Data Security -
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Springer Verlag | 2014|Keywords: Systems and Data Security -
Cryptanalysis of Reduced-Round SIMON32 and SIMON48
Springer Verlag | 2014|Keywords: Systems and Data Security -
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs
Springer Verlag | 2014|Keywords: Systems and Data Security -
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds
Free accessSpringer Verlag | 2015|Keywords: Systems and Data Security -
Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes
Springer Verlag | 2022|Keywords: Systems and Data Security -
Updates on Generic Attacks against HMAC and NMAC
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Secure and efficient mobile agent application development using patterns
Tema Archive | 2003|Keywords: Datensicherheit -
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT
Springer Verlag | 2018|Keywords: Systems and Data Security -
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Springer Verlag | 2013|Keywords: Systems and Data Security -
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Springer Verlag | 2016|Keywords: Systems and Data Security -
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5
Free accessSpringer Verlag | 2014|Keywords: Systems and Data Security -
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode
Springer Verlag | 2020|Keywords: Systems and Data Security -
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR
Springer Verlag | 2022|Keywords: Systems and Data Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.