by
Wagstaff, Samuel S.
Format:
Books
Excerpt:
Cryptanalysis of number theretic ciphers / Wagstaff, Samuel S.
by
Cusick, Thomas W., 1943-
Format:
Electronic Resources
Excerpt:
Stream ciphers and number theory Cusick, Thomas W., 1943-
View Other Search Results
by
Cusick, Thomas W., 1943-
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents http://www.loc.gov/catdir/toc/els051/2004040484.html
Publisher description http://www.loc.gov/catdir/description/els051/2004040484.html
Table of contents http://www.loc.gov/catdir/toc/els051/2004040484.html
Publisher description http://www.loc.gov/catdir/description/els051/2004040484.html
Format:
Electronic Resources
Excerpt:
Stream ciphers and number theory Cusick, Thomas W., 1943-
by
Nakahara Jr., Jorge. author.
Format:
Electronic Resources
Excerpt:
the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of
by
Bauer, Friedrich L. author.
Format:
Electronic Resources
Excerpt:
dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen
by
Koshy, Thomas.
Format:
Electronic Resources
Excerpt:
Readings -- Chapter 9. Cryptology -- 9.1 Affine Ciphers -- 9.2 Hill Ciphers -- 9.3 Exponentiation Ciphers
by
Ash, Avner.
Format:
Electronic Resources
Excerpt:
, and codes and ciphers. They have also been employed in the study of Fibonacci numbers and to attack
Limit Search Results
Narrowed by: