CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records. | 0 | 0.34 | 2020 |
Do children really have a trust bias? Preschoolers reject labels from previously inaccurate robots but not inaccurate humans. | 0 | 0.34 | 2019 |
ILP Formulation for Monitoring-Cycle Construction Using Segment Routing. | 0 | 0.34 | 2018 |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions | 1 | 0.35 | 2015 |
Cryptanalysis Of Reduced-Round Whirlwind | 0 | 0.34 | 2015 |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). | 0 | 0.34 | 2015 |
Cryptanalysis of Reduced-Round Whirlwind (Full Version). | 0 | 0.34 | 2015 |
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version). | 1 | 0.35 | 2014 |
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. | 6 | 0.44 | 2014 |
Improved Preimage Attacks against Reduced HAS-160 | 0 | 0.34 | 2014 |
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. | 0 | 0.34 | 2013 |
Cryptanalysis Of Three Authenticated Encryption Schemes For Wireless Sensor Networks | 0 | 0.34 | 2013 |