CS-Cipher

Results: 180



#Item
121Numerical analysis / Classical cipher / Index of agriculture articles / Mathematical analysis / Computer programming / Mathematics

Reasoning about The Past with Two-Way A u t o m a t a Moshe Y. Vardi* Rice University, Department of Computer Science, Houston, TX[removed], USA A b s t r a c t . The p-calculus can be viewed as essentially the "ultim

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2011-11-08 07:15:10
122Cyberwarfare / ID-based encryption / Ciphertext / RSA / Access control / Hierarchy / Cipher / Key management / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner and Peter Steenkiste October 2004 CMU-CS[removed]

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-11-01 14:47:14
123Cyberwarfare / ID-based encryption / Ciphertext / ElGamal encryption / Hybrid cryptosystem / RSA / Cipher / Access control / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner† and Peter Steenkiste†‡ † Computer Science Department ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-06-27 14:38:48
124Four-square cipher / The Alphabet Cipher

Practical Graph Isomorphism

Add to Reading List

Source URL: cs.anu.edu.au

Language: English - Date: 2010-02-12 07:03:26
125Classical cipher / Mathematical analysis / Mathematics / Four-square cipher

IMPROVED SIMULATED ANNEALING, BOLTZMANN MACHINE, AND ATTRIBUTED GRAPH MATCHING t Lei Xu tt and Erkki Oja Lappeenranta University of Technology, Department of Information Technology BOX 20, 53851 Lappeenranta, Finland A b

Add to Reading List

Source URL: deeplearning.cs.cmu.edu

Language: English - Date: 2013-09-23 15:31:41
126Jan Willem Klop / Four-square cipher / Computer programming / Linguistics / Computing

EWD147.html EWD147 — [removed] . T h e La y out o f HACOSYS i n s t r u c t i o n s .

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-09-04 12:27:54
127Algebra / Cycle / Substring / Pattern matching / Transposition cipher / Pattern / Mathematics / Permutations / Combinatorics

Pattern Matching in the Rearrangement model Amihood Amir BAD 2010 Motivation

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 07:07:14
128Cipher / Advanced Encryption Standard / Key / Password / Google Chrome / Public-key cryptography / Software / Cryptography / Greasemonkey

Programming Assignment 1 Winter 2012 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-01-29 14:18:28
129Cryptography / Portable software / Key management / Password / JavaScript / Greasemonkey / Google Chrome / Web storage / Cipher / Software / Computing / Internet privacy

Programming Assignment 1 Winter 2013 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-01-31 10:59:51
130Cryptographic hash function / Authenticated encryption / RSA / Advanced Encryption Standard / Disk encryption theory / Cryptography / Block cipher / Entropy

Space-Efficient Block Storage Integrity Alina Oprea∗

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 21:17:41
UPDATE