-
1
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
2
Key distribution and recovery algorithm based on Shamir's secret sharing
Published 2015-03-01Subjects: Get full text
Article -
3
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
Published 2024-01-01Subjects: “…Probability of key recovery…”
Get full text
Article -
4
Analysis of the success probability of cube attack
Published 2012-10-01Subjects: Get full text
Article -
5
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: Get full text
Article -
6
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01Subjects: Get full text
Article