1
Ballmann, Bastian
2021
Table of Contents:
“...Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index....”2021
Full text
2
Eisenbarth, Thomas.
2015
Table of Contents:
“...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...”2015
Full text
3
Ochoa, Gabriela.
2015
Table of Contents:
“... and Lower Bounds on Unrestricted Black-Box Complexity of JUMPn,l -- Using Local Search to Evaluate Dispatching Rules in Dynamic Job Shop Scheduling....”2015
Full text
4
Table of Contents:
“... of the Minimum Error Correction Problem -- Fast String Dictionary Lookup with One Error -- On the Readability of Overlap Digraphs -- Improved Algorithms for the Boxed-Mesh Permutation Pattern Matching Problem -- Range Minimum Query Indexes in Higher Dimensions...”
Full text
Full text
5
Lange, Tanja.
2014
Table of Contents:
“... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...”2014
Full text
6
Hong, Hoon.
2014
Table of Contents:
“... System for Mathematical Theory Exploration -- New Approaches in Black Box Group Theory -- A GAP Package for Computing with Real Semisimple Lie Algebras -- Bacterial Genomics and Computational Group Theory: The BioGAP Package for GAP -- SgpDec: Cascade (De...”2014
Full text
7
Prouff, Emmanuel.
2014
Table of Contents:
“... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...”2014
Full text
8
Lindell, Yehuda.
2014
Table of Contents:
“...Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point...”2014
Full text
9
Nicosia, Giuseppe.
2013
Table of Contents:
“... Theory Induction -- Features for Exploiting Black-Box Optimization Problem Structure -- MOCA-I: Discovering Rules and Guiding Decision Maker in the Context of Partial Classification in Large and Imbalanced Datasets -- Sharing Information in Parallel Search...”2013
Full text
10
Prouff, Emmanuel.
2013
Table of Contents:
“... Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers -- Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis -- On 3-Share Threshold Implementations for 4-Bit S-boxes -- Collision-Correlation...”2013
Full text
11
Bonifaci, Vincenzo.
2013
Table of Contents:
“... with Non-modular Regions.-Â Telling Stories Fast: Via Linear-Time Delay Pitch Enumeration -- Undercover Branching.-Â Quadratic Outer Approximation for Convex Integer Programming with Box Constraints -- Separable Non-convex Underestimators for Binary Quadratic...”2013
Full text
12
Knudsen, Lars R.
2013
Table of Contents:
“...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...”2013
Full text
13
Table of Contents:
“... for Serpentine Channel Heat Sink -- Towards Non-linear ConstraintEstimation for Expensive Optimization Repair Methods for Box Constraints Revisited -- Scalability of Population-Based Search Heuristics for Many-Objective Optimization -- On GPU Based Fitness Evaluation...”
Full text
Full text
14
Hamadi, Youssef.
2012
Table of Contents:
“... on Large Population MOEA Using Adaptive ε-Box Dominance and Neighborhood Recombination for Many -- Objective Optimization -- A Non-adaptive Stochastic Local Search Algorithm High-Dimensional Model-Based Optimization Based on Noisy Evaluations of Computer Games...”2012
Full text
15
Bogdanov, Andrey.
2012
Table of Contents:
“... Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some...”2012
Full text
16
Collet, Pierre.
2012
Table of Contents:
“... Optimizer Enhanced with a Differential Evolution Scheme -- Probabilistic Algorithms Evolution of Multisensory Integration in Large Neural Fields -- Reducing the Learning Time of Tetris in Evolution Strategies -- Theory and Evolutionary Search -- Black-Box...”2012
Full text
17
Hou, Yuexian.
2012
Table of Contents:
“... and Document-Centric Features -- Unsupervised Extraction of Popular Product Attributes from Web Sites -- Aggregating Opinions on Hot Topics from Microblog Responses -- Topic Sequence Kernel -- Opening Machine Translation Black Box for Cross-Language Information...”2012
Full text