CS-Cipher

Results: 180



#Item
31Classical cipher / Four-square cipher / Computer programming / Linguistics / Computing

]~psilon-Nets and Simplex Range Queries David H a u s s l e r and E m o Welzl* D e p a r t m e n t of M a t h e m a t i c s and C o m p u t e r S c i e n c e , U n i v e r s i t y of Denver, Denver, Colorado 80208, USA.

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2007-03-20 12:31:59
32Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
33One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
34Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

On the Effectiveness of Movement Prediction To Reduce Energy Consumption in Wireless Communication Srijan Chakraborty and David K. Y. Yau Department of Computer Sciences Purdue University 

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-11 06:24:21
35Mathematics / Code / Notation / Applied mathematics / Cipher / Check digit / Transposition cipher / Hamming / Commercial code / Cryptography / Coding theory / Error detection and correction

Compression, Correction, Confidentiality, and Comprehension: A Look at Telegraph Codes Steven M. Bellovin Columbia University Abstract

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-07-09 23:38:25
36Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-02 08:24:08
37Network performance / Internet privacy / Proxy server / Cipher / RSA / Proxy re-encryption / Cryptography / Computing / Computer networking

1 A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation Siu F. Yeung, John C. S. Lui, Senior Member, IEEE, David K. Y. Yau, Member, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 10:49:44
38Classical cipher / Index of agriculture articles

PDF Document

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2011-02-24 07:34:27
39Action theory / Philosophy of science / Social philosophy / Software engineering / GOAL agent programming language / Classical cipher / Computer programming / Computing / Action

213 ARTIFICIAL INTELLIGENCE Intention Is Choice with Commitment* Philip R. Cohen

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2005-09-17 11:12:50
40Classical cipher / Index of agriculture articles / Computer programming / Software engineering / Computing

PDF Document

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-04-28 02:13:42
UPDATE