by
Dooley, John F. author.
Format:
Electronic Resources
Excerpt:
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms / Dooley, John F
by
Manulis, Mark. editor.
Format:
Electronic Resources
Excerpt:
-- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
View Other Search Results
by
Ryabko, Boris. author.
Format:
Electronic Resources
Excerpt:
, including attacks on block ciphers; and the third chapter describes a homogeneity test used to determine
by
Dobbertin, Hans. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers.
by
Burmester, Mike. editor.
Format:
Electronic Resources
Excerpt:
in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An
by
Cid, Carlos. author.
Format:
Electronic Resources
Excerpt:
effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a
by
Wu, Chuan-Kun. author.
Format:
Electronic Resources
Excerpt:
stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of
by
Susilo, Willy. editor.
Format:
Electronic Resources
Excerpt:
the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
Stream Ciphers -- The Grain Family of Stream Ciphers -- The MICKEY Stream Ciphers -- The
by
Lucks, Stefan. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers with Several Known Plaintexts -- Combiner Driven Management Models and Their Applications
by
Okada, Mitsu. editor.
Format:
Electronic Resources
Excerpt:
ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A
by
Biham, Eli. editor.
Format:
Electronic Resources
Excerpt:
Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle
Limit Search Results
Narrowed by: