Bug Attacks
- 20 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 29 (4), 221-240
- https://doi.org/10.1007/978-3-540-85174-5_13
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis Ltd ,2018
- Defense Science Board Task Force on Patriot System Performance. Report SummaryPublished by Defense Technical Information Center (DTIC) ,2005
- Rabbit: A New High-Performance Stream CipherLecture Notes in Computer Science, 2003
- OAEP ReconsideredLecture Notes in Computer Science, 2001
- Markov Ciphers and Differential CryptanalysisPublished by Springer Science and Business Media LLC ,2001
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Optimal asymmetric encryptionLecture Notes in Computer Science, 1995
- Mental PokerPublished by Springer Science and Business Media LLC ,1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978