Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet. | 1 | 0.35 | 2016 |
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. | 1 | 0.38 | 2014 |
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). | 43 | 1.53 | 2014 |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. | 1 | 0.35 | 2013 |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. | 12 | 0.99 | 2013 |
An experimental security analysis of two satphone standards | 4 | 0.50 | 2013 |
Solving binary linear equation systems over the rationals and binaries | 0 | 0.34 | 2012 |
Angriff auf Thuraya Satellitentelefonie. | 0 | 0.34 | 2012 |
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards | 5 | 0.47 | 2012 |
Eavesdropping on Satellite Telecommunication Systems. | 3 | 0.81 | 2012 |
IPSecco: A lightweight and reconfigurable IPSec core | 4 | 0.45 | 2012 |
Comparison of innovative signature algorithms for WSNs | 18 | 0.82 | 2008 |