-
1
-
-
84874339284
-
-
Technical report, Garnter, Inc. May
-
Gupta, A., Cozza, R., Nguyen, T.H., Milanesi, C., Shen, S., Vergne, H.J.D.L., Zimmermann, A., Lu, C., Sato, A., Glenn, D.: Market Share: Mobile Devices, Worldwide, 1Q12. Technical report, Garnter, Inc. (May 2012)
-
(2012)
Market Share: Mobile Devices, Worldwide, 1Q12
-
-
Gupta, A.1
Cozza, R.2
Nguyen, T.H.3
Milanesi, C.4
Shen, S.5
Vergne, H.J.D.L.6
Zimmermann, A.7
Lu, C.8
Sato, A.9
Glenn, D.10
-
7
-
-
85076227028
-
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
-
Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In: Proceedings of the 21st USENIX Security Symposium (August 2012)
-
Proceedings of the 21st USENIX Security Symposium (August 2012)
-
-
Heninger, N.1
Durumeric, Z.2
Wustrow, E.3
Halderman, J.A.4
-
11
-
-
84865486272
-
Public Keys
-
Advances in Cryptology CRYPTO 2012. Springer, Heidelberg
-
Lenstra, A., Hughes, J., Augier, M., Bos, J., Kleinjung, T., Wachter, C.: Public Keys. In: Advances in Cryptology CRYPTO 2012. LNCS. Springer, Heidelberg (2012)
-
(2012)
LNCS
-
-
Lenstra, A.1
Hughes, J.2
Augier, M.3
Bos, J.4
Kleinjung, T.5
Wachter, C.6
-
12
-
-
84947910726
-
Cryptanalytic Attacks on Pseudorandom Number Generators
-
Fast Software Encryption
-
Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Cryptanalytic Attacks on Pseudorandom Number Generators. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 168-188. Springer, Heidelberg (1998) (Pubitemid 128044673)
-
(1998)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1372
, pp. 168-188
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
13
-
-
77956972305
-
-
Technical report, Duke University
-
Brown, R.G., Eddelbuettel, D., Bauer, D.: Dieharder: A Random Number Test Suite. Technical report, Duke University (2012)
-
(2012)
Dieharder: A Random Number Test Suite
-
-
Brown, R.G.1
Eddelbuettel, D.2
Bauer, D.3
-
14
-
-
0003822632
-
-
Technical report, National Institute of Standards and Technology (NIST) April
-
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S., Bassham III, L.E.: A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. Technical report, National Institute of Standards and Technology (NIST) (April 2010)
-
(2010)
A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
Bassham III, L.E.13
-
15
-
-
70349190950
-
Implementation of high-speed SHA-1 architecture
-
Lee, E.H., Lee, J.H., Park, I.H., Cho, K.R.: Implementation of high-speed SHA-1 architecture. IEICE Electronics Express (2009)
-
(2009)
IEICE Electronics Express
-
-
Lee, E.H.1
Lee, J.H.2
Park, I.H.3
Cho, K.R.4
-
16
-
-
26444538833
-
VMPC One-Way Function and Stream Cipher
-
Roy, B., Meier, W. (eds.) FSE 2004. Springer, Heidelberg
-
Zoltak, B.: VMPC One-Way Function and Stream Cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 210-225. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 210-225
-
-
Zoltak, B.1
-
20
-
-
84937572686
-
Analysis of SHA-1 in Encryption Mode
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Handschuh, H., Knudsen, L.R., Robshaw, M.: Analysis of SHA-1 in Encryption Mode. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 70-83. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 70-83
-
-
Handschuh, H.1
Knudsen, L.R.2
Robshaw, M.3
-
21
-
-
84874307822
-
-
Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M., Suzaki, T., Kawabata, T.: The Most Efficient Distinguishing Attack on VMPC and RC4A (2005)
-
(2005)
The Most Efficient Distinguishing Attack on VMPC and RC4A
-
-
Tsunoo, Y.1
Saito, T.2
Kubo, H.3
Shigeri, M.4
Suzaki, T.5
Kawabata, T.6
-
23
-
-
84863341738
-
Improved cryptanalysis of the vmpc stream cipher
-
Li, S., Hu, Y., Zhao, Y., Wang, Y.: Improved cryptanalysis of the vmpc stream cipher. Journal of Computational Information Systems (2012)
-
(2012)
Journal of Computational Information Systems
-
-
Li, S.1
Hu, Y.2
Zhao, Y.3
Wang, Y.4
-
24
-
-
84874314264
-
-
Technical report, Bit9, Inc. November
-
Sverdlove, H., Brown, D., Cilley, J., Munro, K.: Orphan Android: Top Vulnerable Smartphones 2011. Technical report, Bit9, Inc. (November 2011)
-
(2011)
Orphan Android: Top Vulnerable Smartphones 2011
-
-
Sverdlove, H.1
Brown, D.2
Cilley, J.3
Munro, K.4
|