by
Gong, Guang. editor.
Format:
Electronic Resources
Excerpt:
Applications to Sequences -- Codes for Optical CDMA -- Linear Complexity of Sequences -- On the Linear
by
Golomb, Solomon W. editor.
Format:
Electronic Resources
Excerpt:
Arithmetic Correlation of Sequences -- A Class of Nonbinary Codes and Sequence Families -- Results on the
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools
by
Weiss, Jason.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents http://www.loc.gov/catdir/toc/els051/2003070900.html
Publisher description http://www.loc.gov/catdir/description/els041/2003070900.html
Table of contents http://www.loc.gov/catdir/toc/els051/2003070900.html
Publisher description http://www.loc.gov/catdir/description/els041/2003070900.html
Format:
Electronic Resources
Excerpt:
programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests
by
Ytrehus, Øyvind. editor.
Format:
Electronic Resources
Excerpt:
Extendability of Ternary Linear Codes -- On the Design of Codes for DNA Computing -- Open Problems Related to
by
Breveglieri, Luca. editor.
Format:
Electronic Resources
Excerpt:
-- Non-linear Residue Codes for Robust Public-Key Arithmetic -- Fault Attack Resistant Cryptographic Hardware
by
Bhunia, C.T.
Format:
Electronic Resources
Excerpt:
-- Conventional Encryption -- Classical Cipher -- Substitution Codes -- Transposition Codes -- Crypanalysis of
by
Canteaut, Anne. editor.
Format:
Electronic Resources
Excerpt:
Unconditionally Secure Authenticated Encryption -- Block Ciphers -- Faster Variants of the MESH Block Ciphers
by
Oppliger, Rolf.
Format:
Electronic Resources
Excerpt:
-- 10.2 BLOCK CIPHERS 236 -- 10.3 STREAM CIPHERS 277 -- 10.4 PERFECTLY SECURE ENCRYPTION 281 -- 10.5
by
Dent, Alex.
Format:
Electronic Resources
Excerpt:
based on block ciphers -- 6.4 Dedicated hash functions -- 6.5 Hash functions based on modular arithmetic
by
Ash, Avner.
Format:
Electronic Resources
Excerpt:
, and codes and ciphers. They have also been employed in the study of Fibonacci numbers and to attack
by
Robering, Klaus.
Format:
Electronic Resources
Excerpt:
acknowledging authenticity -- 7. Conclusions -- 8. Selected references -- 173. Ciphers and other secret codes
Limit Search Results