Cipher

Results: 21539



#Item
11

CIPHER Fresno County Public Library Metrics May 2018

Add to Reading List

Source URL: www.fresnolibrary.org

Language: English - Date: 2018-07-06 17:30:08
    12

    Python Python: Build an Enigma box Nate Drake explores how to set up an authentic version of the Enigma Cipher machine used by the German military during World War II.

    Add to Reading List

    Source URL: s3.amazonaws.com

    - Date: 2016-10-27 08:04:10
      13

      Puzzling Cryptography Codes and ciphers are forms of secret communication. A code replaces letters, words, or phrases with different letters or numbers. A cipher rearranges letters or uses substitute symbols to disguise

      Add to Reading List

      Source URL: www.wackenhammer.com

      - Date: 2017-12-04 23:43:07
        14

        Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

        Add to Reading List

        Source URL: fc17.ifca.ai

        - Date: 2017-03-17 11:54:08
          15

          Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

          Add to Reading List

          Source URL: www.nku.edu

          - Date: 2015-03-02 09:09:50
            16

            An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2012-07-17 05:04:16
              17

              Lightweight version of ˇ-Cipher

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2015-07-20 09:35:31
                18

                Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-05-23 08:52:57
                  19

                  Lightweight version of π-Cipher Hristina Mihajloska, Mohamed El Hadedy, Danilo Gligoroski and Kevin Skadron Department of Computer Science University of Virginia

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  - Date: 2015-07-20 09:29:07
                    20

                    TCG 火焰之纹章0(Cipher)综合规则 Ver. 1.05 目录 1. 游戏与玩家

                    Add to Reading List

                    Source URL: 7xjwb8.com1.z0.glb.clouddn.com

                    - Date: 2016-06-01 13:13:28
                      UPDATE