COSIC

Results: 193



#Item
151Neurotechnology / Wireless / Electrodiagnosis / Electrophysiology / Neurophysiology / Acupuncture / Electroencephalography / Extremely low frequency / Schumann resonances / Medicine / Physics / Health

Irena Ćosić Professor

Add to Reading List

Source URL: www.mas.bg.ac.rs

Language: English - Date: 2013-01-24 06:53:50
152RC4 / Fluhrer /  Mantin and Shamir attack / Grain / Stream ciphers / Cryptography / Keystream

Cryptanalysis of Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-07-18 08:11:42
153Advanced Encryption Standard / Data Encryption Standard / LEX / UES / Py / AES implementations / VEST / ARIA / Q / Cryptography / Stream ciphers / Block ciphers

A New 128-bit Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-13 11:02:24
154Key schedule / ICE / Decorrelation theory / Block cipher / Advanced Encryption Standard / Boomerang attack / Cryptography / Differential cryptanalysis / DFC

1 On The Decorrelated Fast Cipher (DFC) and Its

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
155Block cipher / LEX / Key schedule / VEST / ARIA / QUAD / XSL attack / Grain / Cryptography / Stream ciphers / Advanced Encryption Standard

Algebraic Cryptanalysis of a Small-Scale Version of Stream Cipher LEX Vesselin Velichkov

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
156Block ciphers / Serpent / Preimage attack / Cryptography / Cryptographic hash functions / NIST hash function competition

The Hash Function Hamsi ¨ ul K¨ Ozg¨

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
157Information / Challenge-response authentication / IP / Commitment scheme / NP / Transmission Control Protocol / Communications protocol / Error detection and correction / Alice and Bob / Cryptographic protocols / Data / Cryptography

Distance Bounding in Noisy Environments Dave Singel´ee and Bart Preneel ESAT-COSIC, K.U.Leuven,

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
158

Bora Ćosić, rođen[removed]u Zagrebu, živio je prvo u Kraljevini Jugoslaviji, zatim jako dugo u poratnoj Titovoj republici. U djetinjstvu je izdržao njemačku okupaciju Beograda[removed]), za onu drugu, srpskog nacionalizma, početkom devedesetih godina, nije imao volje, našao se u dobrovoljnom progonstvu. Danas živi u Berlinu.

Add to Reading List

Source URL: www.pen.hr

Language: Croatian - Date: 2013-05-16 21:08:13
    159Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

    1 New Weak-Key Classes of IDEA

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    160Mathematics / Estimation theory / Symbol / Orbifold / Differential cryptanalysis / Linear cryptanalysis / Permutation

    1 The Block Cipher Square

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    UPDATE