by
Carlet, Claude. editor.
Format:
Electronic Resources
Excerpt:
-- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
by
Adams, Carlisle. editor.
Format:
Electronic Resources
Excerpt:
Information Security -- Cryptography -- Bock Ciphers -- Stream Ciphers -- Hash Functions -- Message
View Other Search Results
by
Sobh, Tarek. editor.
Format:
Electronic Resources
Excerpt:
Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security
by
Garay, Juan A. editor.
Format:
Electronic Resources
Excerpt:
Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as
by
Goubin, Louis. editor.
Format:
Electronic Resources
Excerpt:
Cryptosystem -- Special Purpose Hardware -- Breaking Ciphers with COPACOBANA –A Cost-Optimized Parallel Code
by
Katsikas, Sokratis K. editor.
Format:
Electronic Resources
Excerpt:
Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round
by
Meersman, Robert. editor.
Format:
Electronic Resources
Excerpt:
on Block Ciphers -- New Key Generation Algorithms for the XTR Cryptosytem -- Public-Key Encryption
Limit Search Results
Narrowed by: