Advanced Encryption Standard

Results: 1268



#Item
41NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

NEWS Enova Technology Corporation 1st Floor, #11, Research & Development 2nd Road Science-based Industrial Park, Hsin-Chu City Taiwan 30076, Republic of China Phone:

Add to Reading List

Source URL: www.enovatech.net

Language: English - Date: 2013-01-11 00:43:12
422014 Waterways Field Program Summary

2014 Waterways Field Program Summary

Add to Reading List

Source URL: asapgas.agdc.us

Language: English - Date: 2015-10-19 05:31:52
43Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory  Serpent is a 128-bit block cipher designed by Ross

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
44Introduction Linear redundancy in AES-like Sboxes The affine equivalence of XSL-like round functions Analyzing the influence of linear redundancy in S-boxes with affine

Introduction Linear redundancy in AES-like Sboxes The affine equivalence of XSL-like round functions Analyzing the influence of linear redundancy in S-boxes with affine

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:54
45Microsoft Word - 4n - D1314918_MAV31_FIPS_SP 1.12.docx

Microsoft Word - 4n - D1314918_MAV31_FIPS_SP 1.12.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-07 11:28:48
46(Comparing) Hardware Complexity of Cryptographic Algorithms Liam Marnane University College Cork Claude Shannon Institute

(Comparing) Hardware Complexity of Cryptographic Algorithms Liam Marnane University College Cork Claude Shannon Institute

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:20
47Cost of cryptography in hardware Ingrid Verbauwhede ingrid.verbauwhede-at-esat.kuleuven.be K.U.Leuven, ESAT- SCD - COSIC Computer Security and Industrial Cryptography

Cost of cryptography in hardware Ingrid Verbauwhede ingrid.verbauwhede-at-esat.kuleuven.be K.U.Leuven, ESAT- SCD - COSIC Computer Security and Industrial Cryptography

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:06
48ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-14 13:47:17
49Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2016-05-11 21:52:06
50Memorandum To: AES Unit Heads  From:

Memorandum To: AES Unit Heads From:

Add to Reading List

Source URL: agritech.uark.edu

Language: English - Date: 2015-10-27 11:48:06