301![PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2 PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2](https://www.pdfsearch.io/img/71b9d9b0f70d054c12921266b9be09c8.jpg) | Add to Reading ListSource URL: homes.esat.kuleuven.beLanguage: English - Date: 2010-11-09 16:59:40
|
---|
302![M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]. M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].](https://www.pdfsearch.io/img/ec3d91e8525f05ca7c02526f1d1a7343.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 1998-02-09 17:09:39
|
---|
303![Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 , Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,](https://www.pdfsearch.io/img/2cceb0e7aa1d0c9f2325176fd6ce44fa.jpg) | Add to Reading ListSource URL: www.ii.uib.noLanguage: English - Date: 2008-03-07 13:01:06
|
---|
304![Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1 Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1](https://www.pdfsearch.io/img/0ec3c5101975b9d0a9caf78b57565ce4.jpg) | Add to Reading ListSource URL: www.ssi.gouv.frLanguage: English - Date: 2012-11-06 05:29:21
|
---|
305![TCSI[removed]..16 TCSI[removed]..16](https://www.pdfsearch.io/img/c2a6ac1a06f7e54e71772e564d9af569.jpg) | Add to Reading ListSource URL: www.sciengines.comLanguage: English - Date: 2009-08-11 09:06:39
|
---|
306![Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.](https://www.pdfsearch.io/img/cb61655a1662a72340d91a80f13e25af.jpg) | Add to Reading ListSource URL: web.eecs.utk.eduLanguage: English - Date: 2004-12-30 09:37:46
|
---|
307![This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac](https://www.pdfsearch.io/img/34e49d9b6f81a27b144232cc2bac6024.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2011-07-10 02:35:13
|
---|
308![NADA Numerisk analys och datalogi Kungl Tekniska Högskolan NADA Numerisk analys och datalogi Kungl Tekniska Högskolan](https://www.pdfsearch.io/img/82669f43eb1cf5c5e509293a02672c9e.jpg) | Add to Reading ListSource URL: www.nada.kth.seLanguage: English |
---|
309![Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov](https://www.pdfsearch.io/img/c4182b9c0cd8f3239bc5104171134230.jpg) | Add to Reading ListSource URL: www.cs.colorado.eduLanguage: English - Date: 2001-10-23 20:39:38
|
---|
310![To appear in J. of Cryptology To appear in J. of Cryptology](https://www.pdfsearch.io/img/2c395227cc841161d298cd0788ca81ce.jpg) | Add to Reading ListSource URL: www.cs.ucdavis.eduLanguage: English - Date: 2008-09-21 22:35:16
|
---|