by
Taylor, Greg, author.
Format:
Books
Excerpt:
Ciphers in literature.
by
Rubinger, Richard.
Format:
Electronic Resources
Excerpt:
Tokugawa Villages -- Signatures, Ciphers, and Seals -- Rural Culture and the Rise of Provincial Literati in
View Other Search Results
by
Caciola, Nancy.
Format:
Electronic Resources
Excerpt:
PROTRACTED DISPUTATION" -- 1. Possessed Behaviors -- 2. Ciphers -- PART II: SPIRITUAL PHYSIOLOGIES -- 3
by
Fraser, Gordon, 1943-
Table of contents only http://www.loc.gov/catdir/toc/ecip059/2005006466.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005006466-d.html
Publisher description http://www.loc.gov/catdir/enhancements/fy0659/2005006466-d.html
Format:
Books
Excerpt:
/ Superfluids / Quantum phase transitions / Quanta in action. Essential quantum entanglement / Quanta, ciphers
by
Cid, Carlos. author.
Format:
Electronic Resources
Excerpt:
effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a
by
Burmester, Mike. editor.
Format:
Electronic Resources
Excerpt:
in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An
by
Pointcheval, David. editor.
Format:
Electronic Resources
Excerpt:
Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with
by
Tymieniecka, Anna-Teresa. editor.
Format:
Electronic Resources
Excerpt:
transformability of the creative logos as it ciphers through the aesthetic sense, the elements of experience
by
Rhee, Min Surp. editor.
Format:
Electronic Resources
Excerpt:
-- Hashing with Polynomials -- Birthday Paradox for Multi-collisions -- Block and Stream Ciphers -- New
by
Cook, Debra L. author.
Format:
Electronic Resources
Excerpt:
programmed in existing GPUs. While certain operations make it impossible to implement some ciphers in a GPU
by
Won, Dong Ho. editor.
Format:
Electronic Resources
Excerpt:
Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I
by
Lai, Xuejia. editor.
Format:
Electronic Resources
Excerpt:
Generator -- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition -- Construction and
Limit Search Results
Narrowed by: