Author of the publication

Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis.

, , and . Journal in Computer Virology, 6 (3): 207-237 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Honeypot Forensics, Part II: Analyzing the Compromised Host., , , and . IEEE Security & Privacy, 2 (5): 77-80 (2004)Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis., , and . Journal in Computer Virology, 6 (3): 207-237 (2010)Small treatise about e-manipulation for honest people., and . Journal in Computer Virology, 6 (2): 143-159 (2010)Wet-process deposition of TSV liner and metal films., , and . 3DIC, page 1-6. IEEE, (2009)New Threats and Attacks on the World Wide Web., , and . IEEE Security & Privacy, 4 (2): 72-75 (2006)Individual GP: an Alternative Viewpoint for the Resolution of Complex Problems., , , and . GECCO, page 974-981. Morgan Kaufmann, (1999)Links between cryptography and information hiding., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 269-280. SPIE, (2002)Rootkit modeling and experiments under Linux., , and . Journal in Computer Virology, 4 (2): 137-157 (2008)StirMark Benchmark: Audio Watermarking Attacks., , , , , , , and . ITCC, page 49-54. IEEE Computer Society, (2001)Public automated web-based evaluation service for watermarking schemes: StirMark benchmark., , , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 575-584. SPIE, (2001)