Forgery

Results: 1137



#Item
1Introduction  Forgery attack against CBC-MAC Modes of operations

Introduction Forgery attack against CBC-MAC Modes of operations

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
2Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France   Abstract. LAC is one of the candidates to the CAESAR competition.

Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
3Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1  ANSSI, France

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
4Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson  Stanford University

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2012-03-30 06:50:04
5Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Add to Reading List

Source URL: nebelwelt.net

Language: English - Date: 2018-08-13 04:44:10
    6Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong Mathias Payer

    Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong Mathias Payer

    Add to Reading List

    Source URL: nebelwelt.net

    Language: English - Date: 2018-08-13 04:44:10
      7Everyone Forges the Thing They Love: Decadence, Creative Imagination and Literary Forgery in Oscar Wilde’s Prose Work Dr. Evrim Doğan Adanur Oscar Wilde’s prose work towards the end of the century took a different t

      Everyone Forges the Thing They Love: Decadence, Creative Imagination and Literary Forgery in Oscar Wilde’s Prose Work Dr. Evrim Doğan Adanur Oscar Wilde’s prose work towards the end of the century took a different t

      Add to Reading List

      Source URL: www.ystad.se

      Language: English - Date: 2018-06-05 05:30:37
        8Vocal Forgery in Forensic Sciences Patrick Perrot12 , Mathieu Morel2 , Joseph Razik2 , G´erard Chollet2 1 Institut de Recherche Criminelle de la Gendarmerie Nationale, Rosny sous BoisFrance

        Vocal Forgery in Forensic Sciences Patrick Perrot12 , Mathieu Morel2 , Joseph Razik2 , G´erard Chollet2 1 Institut de Recherche Criminelle de la Gendarmerie Nationale, Rosny sous BoisFrance

        Add to Reading List

        Source URL: razik.univ-tln.fr

        Language: English - Date: 2015-12-29 04:57:15
          9Increased DNS Forgery Resistance Through 0x20-Bit Encoding SecURItY viA LeET QueRieS David Dagon  Manos Antonakakis

          Increased DNS Forgery Resistance Through 0x20-Bit Encoding SecURItY viA LeET QueRieS David Dagon Manos Antonakakis

          Add to Reading List

          Source URL: classes.soe.ucsc.edu

          - Date: 2009-04-07 22:22:49
            10Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck* Aaron Zauner†‡

            Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Böck* Aaron Zauner†‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-05-17 13:33:54