by
Koren, Israel.
Format:
Electronic Resources
Excerpt:
Symmetric Key Ciphers -- 9.2.2 Fault Attacks on Public (Asymmetric) Key Ciphers -- 9.3 Countermeasures -- 9
by
Oppliger, Rolf.
Format:
Electronic Resources
Excerpt:
Ciphers -- 6.3.2 Other Stream Ciphers -- 6.4 PERFECTLY SECURE ENCRYPTION -- 6.5 FINAL REMARKS
by
Li, Yongqing.
Format:
Electronic Resources
Excerpt:
-- Authentication Codes in the Query Model R. Safavi-Naini, D. Tonien and P. R. Wild -- 1. Introduction -- 2
Limit Search Results