Springer

Central database

Publisher

  1. 2011
  2. Published

    Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces. / Yang, Fan; Aotani, Tomoyuki; Masuhara, Hidehiko; Nielson, Flemming; Nielson, Hanne Riis.

    Coordination Models and Languages: 13th International Conference, COORDINATION 2011, Reykjavik, Iceland, June 6-9, 2011 - Proceedings. Vol. 6721 Springer, 2011. p. 202-218 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  3. Published

    Cryptanalysis of ARMADILLO2. / Abdelraheem, Mohamed Ahmed; Blondeau, Céline; Naya-Plasencia, María; Videau, Marion; Zenner, Erik.

    Advances in Cryptology. ed. / Dong Hoon Lee; Xiaoyun Wang. Springer, 2011. p. 308-326 (Lecture Notes in Computer Science; No. 7073).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  4. Published

    Cryptanalysis of the Light-Weight Cipher A2U2. / Abdelraheem, Mohamed Ahmed; Borghoff, Julia; Zenner, Erik; David, Mathieu.

    Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings. ed. / Liqun Chen. Vol. LNCS 7089 Springer, 2011. p. 375-390.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  5. Published

    Decoding algorithms. / Peters, Christiane.

    Encyclopedia of Cryptography and Security. ed. / Henk C.A. van Tilborg; Sushil Jajodia. Springer, 2011.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  6. Published

    Deterministic Differential Properties of the Compression Function of BMW. / Guo, Jian; Thomsen, Søren Steffen.

    Selected Areas in Cryptography 2010: 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, Revised Selected Papers. ed. / Alex Biryukov; Guang Gong; Douglas R. Stinson. Vol. 6544 Springer, 2011. p. 338-350 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  7. Published

    Differential cryptanalysis of round-reduced PRINTcipher: Computing roots of permutations. / Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik.

    Lecture Notes in Computer Science. Vol. 6733 Springer, 2011.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  8. Published

    Diffie-Hellman without Difficulty. / Mödersheim, Sebastian Alexander.

    Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011. ed. / Gilles Barthe; Anupam Datta; Sandro Etalle . Springer, 2011. p. 214-229 (Lecture Notes in Computer Science).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  9. Double SP-Functions: Enhanced Generalized Feistel Networks : Extended Abstract. / Bogdanov, Andrey; Shibutani, Kyoji.

    Information Security and Privacy. Proceedings. Springer, 2011. p. 106-119 (Lecture Notes in Computer Science, Vol. 6812).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2011

  10. Ecodesign Maturity Model: criteria for methods and tools classification. / Pigosso, Daniela Cristina Antelmi; Rozenfeld, H.; Seliger, G.

    Advances in Sustainable Manufacturing: Proceedings of the 8th Global Conference on Sustainable Manufacturing. ed. / Günther Seliger; Marwan M.K. Khraisheh; I.S. Jawahir. Springer, 2011. p. 241-245.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

  11. Published

    Edge emitters with external cavities : Chapter 15.1. / Chi, Mingjun; Petersen, Paul Michael.

    Landolt-Börnstein: Numerical Data and Functional Relationships in Science and Technology-New Series: VIII/1B3, Laser Systems. Vol. 3 Berlin : Springer, 2011. p. 245-257.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2011

Download list: To download, please limit the number of search results to 1,000 or less.