CS-Cipher

Results: 180



#Item
41Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
42HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
43Block cipher modes of operation / Encryption / Advanced Encryption Standard / Initialization vector / Computer security / Public-key cryptography / Cryptography / Precomputation / Authenticated encryption

Secure Cryptographic Precomputation with Insecure Memory? Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:18
44Classical cipher / Index of agriculture articles

Irregularity in Multi-Dimensional Space-Filling Curves with Applications in Multimedia Databases Mohamed F. Mokbel Walid G. Aref

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:39
45Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

Outliers: The Story of Success (Little, Brown & Co; 2008)

Add to Reading List

Source URL: cs.ecust.edu.cn

Language: English - Date: 2013-01-13 20:14:59
46Four-square cipher / Classical cipher

PDF Document

Add to Reading List

Source URL: iram.cs.berkeley.edu

Language: English - Date: 2000-01-18 18:21:10
47Cycle / Transposable element / Transposition cipher / Evolution / Permutation pattern / Permutations / Mathematics / Permutation

A new and faster method of sorting by transpositions Maxime Benoˆıt-Gagne´ et Sylvie Hamel ´ ´ Departement

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2007-07-27 14:38:37
48Crypto-1 / Stream cipher / KeeLoq / Block cipher / Radio-frequency identification / Cipher / Cryptanalysis / Strong cryptography / Key / Cryptography / Key management / MIFARE

USENIX Security Symposium. San Jose, CA. 31 JulyReverse-Engineering a Cryptographic RFID Tag Karsten Nohl and David Evans University of Virginia Department of Computer Science

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-05-14 16:00:09
49Seattle Mariners all-time roster / Four-square cipher / Control theory / Optimal control / Stochastic control

Exact Bayesian Learning of Ancestor Relations in Bayesian Networks Exact Bayesian Learning of Ancestor Relations in Bayesian Networks Supplementary Material Yetian Chen

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2015-01-23 16:32:42
50Cipher / Block cipher / Public-key cryptography / Key / RSA / Substitution cipher / One-time pad / Stream cipher / Index of cryptography articles / Cryptography / Symmetric-key algorithm / Ciphertext

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
UPDATE