49.
by
Sobh, Tarek. editor.
Format:
Electronic Resources
Excerpt:
applications: Authentication Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation
by
Rodríguez-Henríquez, Francisco. author.
Format:
Electronic Resources
Excerpt:
Implementation of Hash Functions -- General Guidelines for Implementing Block Ciphers in FPGAs -- Architectural
by
Burmester, Mike. editor.
Format:
Electronic Resources
Excerpt:
in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An
by
Cid, Carlos. author.
Format:
Electronic Resources
Excerpt:
effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a
by
Wu, Chuan-Kun. author.
Format:
Electronic Resources
Excerpt:
stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of
by
Haufler, Hervie.
Format:
Electronic Resources
Excerpt:
readers behind the scenes in this fascinating underground world of ciphers and decoders. This broad view
by
Sobh, Tarek. editor.
Format:
Electronic Resources
Excerpt:
Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security
by
Susilo, Willy. editor.
Format:
Electronic Resources
Excerpt:
the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers -- Signature (Short Papers) -- Practical
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
Stream Ciphers -- The Grain Family of Stream Ciphers -- The MICKEY Stream Ciphers -- The
by
Lucks, Stefan. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers with Several Known Plaintexts -- Combiner Driven Management Models and Their Applications
by
Bauer, Friedrich L. author.
Format:
Electronic Resources
Excerpt:
dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen
by
Biham, Eli. editor.
Format:
Electronic Resources
Excerpt:
Cryptanalysis of Pomaranch Version 2 -- Multi-pass Fast Correlation Attack on Stream Ciphers -- Crossword Puzzle
Limit Search Results