Export results as [feed] RSS 1.0 [feed] RSS 2.0

Citation

Skip to: A | B | G | H | K | S | T | V | Z

A

Armknecht, Frederik (2006) Algebraic attacks on certain stream ciphers. Open Access None Mannheim [Doctoral dissertation]
[img]
Preview

Armknecht, Frederik ; Seifert, Jean-Pierre Third International Workshop on Trustworthy Embedded Devices (TrustED 2013). Open Access Sadeghi, Ahmad-Reza 1479-1480 In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security : CCS'13 ; November 4-8, 2013, Berlin, Germany (2013) New York, NY [Conference or workshop publication]
[img]
Preview

Armknecht, Frederik ; Hauptmann, Manuel ; Roos, Stefanie ; Strufe, Thorsten (2013) Protecting Public OSN Posts from Unintended Access. Open Access Mannheim [u.a.] [Working paper]
[img]
Preview

B

Beller, Michael (2005) Ein intuitives Verfahren zur adaptiven merkmalsgestützten Segmentierung. Open Access None Mannheim [Doctoral dissertation]
[img]
Preview

Becherer, Nico (2008) Simulation von Herzkatheterinterventionen bei Kleinkindern. Open Access None Mannheim [Doctoral dissertation]
[img]
Preview

G

Guetat, Amel (2008) Real Time Rendering of Deformable and Semi-Transparent Objects by Volume Rendering. Open Access None Mannheim [Doctoral dissertation]
[img]
Preview

H

Hamann, Matthias (2018) Lightweight cryptography on ultra-constrained RFID devices. Open Access Mannheim [Doctoral dissertation]
[img]
Preview

Hamann, Matthias ; Krause, Matthias ; Meier, Willi (2017) LIZARD - A lightweight stream cipher for power-constrained devices. Open Access IACR Transactions on Symmetric Cryptology Bochum 2017 1 45-79 [Article]
[img]

K

Krause, Matthias ; Armknecht, Frederik ; Fleischmann, Ewan (2010) Preimage resistance beyond the birthday bound: Double-length hashing revisited. Open Access Cryptology ePrint Archive Santa Barbara, CA Report 2010/519 [Working paper]
[img]
Preview

S

Stegemann, Dirk (2011) Selected Cryptographic Methods for Securing Low-End Devices. Open Access Mannheim [Doctoral dissertation]
[img]
Preview

T

Tatli, Emin Islam (2008) Security in Context-aware Mobile Business Applications. Open Access None [Doctoral dissertation]
[img]
Preview

V

Vahdati Daneshmand, Siavash (2004) Algorithmic Approaches to the Steiner Problem in Networks. Open Access None [Doctoral dissertation]
[img]
Preview

Z

Zenner, Erik (2004) On Cryptographic Properties of LFSR-based Pseudorandom Generators. Open Access None [Doctoral dissertation]
[img]
Preview

This list was created automatically on Fri Aug 19 07:22:38 2022 CEST