CS-Cipher

Results: 180



#Item
131Just another Perl hacker / Perl / Classical cipher

 , @U? J ?EF9$9 7

Add to Reading List

Source URL: www.cs.engr.uky.edu

Language: English - Date: 1998-07-03 14:30:19
132VEST / Cipher / Block cipher / Differential cryptanalysis / Key size / ESTREAM / Phelix / Grain / Stream ciphers / Cryptography / Py

The Truth on TPy Eli Biham∗

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2008-02-29 12:28:09
133Classical cipher / Huffman coding / Letter / Flip-flop

The Nineteenth Annual ACM International Collegiate Programming Contest Finals sponsored by Problem A

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-03-02 18:16:41
134Software engineering / Classical cipher / International Obfuscated C Code Contest / Computer programming / Latin alphabets / Computing

     -/..0 5#   " =   6 2             

Add to Reading List

Source URL: www.cs.engr.uky.edu

Language: English - Date: 2003-08-28 13:11:21
135Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

         

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2002-12-13 03:17:33
136SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

The SHAvite-3 Hash Function Tweaked Version[removed]

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2009-11-23 10:40:19
137Chosen-plaintext attack / Ciphertext / Cryptanalysis / RSA / Four-square cipher / Two-square cipher / Cryptography / Data Encryption Standard / Tiny Encryption Algorithm

OWN33 Powers of t 0

Add to Reading List

Source URL: cs.jhu.edu

Language: English - Date: 2008-11-17 00:24:59
138Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
139IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
140Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
UPDATE