Your search for 38521 returns 3623 document(s) |
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44 |
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Block ciphers and systems of quadratic equations, (LNCS-Lecture Notes in Computer Science 2887) Hal 274-289 |
Author: Alex Biryukov; Christophe De Canniere; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8 |
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of sober-t32, (LNCS-Lecture Notes in Computer Science 2887) Hal 111-128 |
Author: Steve Babbage; Christophe De Canniere; Joseph Lano; Bart Preneel; Joos Vandewalle; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A fast correlation attack for LFSR-based stream ciphers, (LNCS-Lecture Notes in Computer Science 2576) Hal 331-342 |
Author: Sarbani Palit; Bimal K. Roy; Arindom De; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of involutional ciphers: khazad and anubis, (LNCS-Lecture Notes in Computer Science 2887) Hal 45-53 |
Author: Alex Biryukov; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244 |
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Differential-linear cryptanalysis of serpent, (LNCS-Lecture Notes in Computer Science 2887) Hal 9-21 |
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal key ranking procedures in a statistical cryptanalysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 235-246 |
Author: Pascal Junod; Serge Vaudenay; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The security of one block to many modes of operation, (LNCS-Lecture Notes in Computer Science 2887) Hal 376-395 |
Author: Henri Gilbert; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|