Springer

Central database

Publisher

  1. 2010
  2. Published

    Cryptanalysis of Tav-128 hash function. / Kumar, Ashish; Sanadhya, Somitra Kumar; Gauravaram, Praveen; Safkhani, Masoumeh; Naderi, Majid.

    Proceedings of Indocrypt 2010: 11th International Conference on Cryptology in India. ed. / Guang Gong; Kishan Chand Gupta. Springer, 2010. p. 118-130 (Lecture Notes in Computer Science, Vol. 6498).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  3. Published

    Cryptanalysis of the ESSENCE Family of Hash Functions. / Mouha, Nicky; Sekar, Gautham; Aumasson, Jean-Philippe; Peyrin, Thomas; Thomsen, Søren Steffen; Turan, Meltem Sönmez; Preneel, Bart.

    Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Springer, 2010. p. 15-34 (Lecture Notes in Computer Science; No. 6151).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  4. Published

    Cryptographic Hash Functions. / Gauravaram, Praveen; Knudsen, Lars Ramkilde.

    Handbook of Information and Communication Security. ed. / Peter Stavroulakis; Mark Stamp. 1. ed. Berlin Heidelberg : Springer, 2010. p. 59-80 (Engineering).

    Publication: Research - peer-reviewBook chapter – Annual report year: 2010

  5. Published

    Design of an Enterobacteriaceae Pan-genome Microarray Chip. / Lukjancenko, Oksana; Ussery, David.

    CSBio 2010. Vol. 115 Springer, 2010. p. 174-189.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  6. Published

    Developing a Coding Scheme to Analyse Creativity in Highly-constrained Design Activities. / Dekoninck, Elies; Yue, Huang; Howard, Thomas J.; McMahon, Chris/A.

    Design Creativity 2010. Springer, 2010. p. 157-164.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  7. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs. / Bogdanov, Andrey; Eisenbarth, Thomas; Paar, Christof; Wienecke, Malte.

    Topics in Cryptology - CT-RSA 2010. Proceedings. Springer, 2010. p. 235-251 (Lecture Notes in Computer Science, Vol. 5985).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  8. Published

    Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256. / Aumasson, Jean-Philippe; Käsper, Emilia; Knudsen, Lars Ramkilde; Matusiewicz, Krystian; Ødegård, Rune; Peyrin, Thomas; Schläffer, Martin.

    Proceedings of the 15th Australasian conference on Information security and privacy: July 5-7. Sydney, Australia : Springer, 2010. p. 87-103 (Lecture notes in computer science; No. 6168).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  9. Distributed online learning of central pattern generators in modular robots. / Christensen, David Johan; Spröwitz, Alexander; Ijspeert, Auke Jan.

    From Animals to Animats 11. ed. / R. Goebel; J. Siekmann; W. Wahlster. Springer, 2010. p. 402-412 (Lecture Notes in Computer Science; No. 6226).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  10. Evolution Over the Life Span of Complex Systems. / Pena, M.; Ibragimova, E.S.; Thompson, M.K.

    Global Product Development: Proceedings of the 20th CIRP Design Conference. ed. / Alain Bernard. Springer, 2010. p. 51-59.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

  11. Published

    Fast Arc-Annotated Subsequence Matching in Linear Space. / Bille, Philip; Gørtz, Inge Li.

    SOFSEM 2010: Theory and Practice of Computer Science. Springer, 2010. p. 188-199 (Lecture Notes in Computer Science, Vol. 5901).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2010

Download list: To download, please limit the number of search results to 1,000 or less.