|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 7 keywords
|
|
|
Results
Found 6 publication records. Showing 5 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
245 | Mathias Herrmann, Gregor Leander |
A Practical Key Recovery Attack on Basic TCHo. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
TCHo, stream cipher, chosen ciphertext attack |
56 | Matthieu Finiasz, Serge Vaudenay |
When Stream Cipher Analysis Meets Public-Key Cryptography. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Moon-Seok Kim, Sungho Kim, Sang-Kyung Yoo, Bong-Soo Lee, Ji-Man Yu, Il-Woong Tcho, Yang-Kyu Choi |
Error reduction of SRAM-based physically unclonable function for chip authentication. |
Int. J. Inf. Sec. |
2023 |
DBLP DOI BibTeX RDF |
|
42 | Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay |
TCHo: A Hardware-Oriented Trapdoor Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
hardware, linear feedback shift register, public-key cryptosystem, polynomial multiples, post-quantum cryptography |
28 | Maribeth Back, Timothy Childs |
High-tech chocolate: exploring 3D and mobile applications for factories. |
SIGGRAPH Talks |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #5 of 5 (100 per page; Change: )
|
|