Linked e-resources
Details
Table of Contents
Block cipher cryptanalysis
Understanding attacks
Implementation issues
More block cipher cryptanalysis
Cryptanalysis of authenticated encryption schemes
Proofs
Design
Lightweight
Cryptanalysis of hash functions and stream ciphers
Mass surveillance.
Understanding attacks
Implementation issues
More block cipher cryptanalysis
Cryptanalysis of authenticated encryption schemes
Proofs
Design
Lightweight
Cryptanalysis of hash functions and stream ciphers
Mass surveillance.