by
Nakahara Jr., Jorge. author.
Format:
Electronic Resources
Excerpt:
the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of
by
Fraser, Gordon, 1943-
Table of contents only http://www.loc.gov/catdir/toc/ecip059/2005006466.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005006466-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005006466-d.html
Format:
Books
Excerpt:
/ Superfluids / Quantum phase transitions / Quanta in action. Essential quantum entanglement / Quanta, ciphers
by
Daverio, John.
Format:
Electronic Resources
Excerpt:
"Clara" in Tones -- 3. SCHUMANN: CRYPTOGHAPHER OR PICTOGRAPHER? -- 4. BRAHMS'S MUSICAL CIPHERS: ACTS OF
by
Lang, Benedek
Format:
Books
Excerpt:
book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic
by
Lin, Dongdai. editor.
Format:
Electronic Resources
Excerpt:
papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic
by
Manulis, Mark. editor.
Format:
Electronic Resources
Excerpt:
-- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
7.
by
Law, David R.
Format:
Electronic Resources
Excerpt:
characters-or "ciphers"-that inhabit religion and art and which point beyond these horizons. Perceiving these is
by
Eminağaoğlu, Mete.
Format:
Manuscript
Excerpt:
symmetric block ciphers are difTerential and linear cryptanalysis. But these cryptanalytic attacks need to
by
Ryabko, Boris. author.
Format:
Electronic Resources
Excerpt:
, including attacks on block ciphers; and the third chapter describes a homogeneity test used to determine
by
St. Denis, Tom.
Format:
Electronic Resources
Excerpt:
algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message
by
Dobbertin, Hans. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers.
by
Anashin, Vladimir.
Format:
Electronic Resources
Excerpt:
-- Chapter 9. Pseudorandom numbers -- Chapter 10. Stream ciphers -- Chapter 11. Structure of trajectories
Limit Search Results