Cipher

Results: 21539



#Item
11CIPHER  Fresno County Public Library Metrics May 2018

CIPHER Fresno County Public Library Metrics May 2018

Add to Reading List

Source URL: www.fresnolibrary.org

Language: English - Date: 2018-07-06 17:30:08
    12Python  Python: Build an Enigma box Nate Drake explores how to set up an authentic version of the Enigma Cipher machine used by the German military during World War II.

    Python Python: Build an Enigma box Nate Drake explores how to set up an authentic version of the Enigma Cipher machine used by the German military during World War II.

    Add to Reading List

    Source URL: s3.amazonaws.com

    - Date: 2016-10-27 08:04:10
      13Puzzling Cryptography Codes and ciphers are forms of secret communication. A code replaces letters, words, or phrases with different letters or numbers. A cipher rearranges letters or uses substitute symbols to disguise

      Puzzling Cryptography Codes and ciphers are forms of secret communication. A code replaces letters, words, or phrases with different letters or numbers. A cipher rearranges letters or uses substitute symbols to disguise

      Add to Reading List

      Source URL: www.wackenhammer.com

      - Date: 2017-12-04 23:43:07
        14Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

        Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

        Add to Reading List

        Source URL: fc17.ifca.ai

        - Date: 2017-03-17 11:54:08
          15Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

          Spring 2015 Chris Christensen MAT/CSC 483 Cryptanalysis of the Vigenère Cipher: The Friedman Test

          Add to Reading List

          Source URL: www.nku.edu

          - Date: 2015-03-02 09:09:50
            16An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

            An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2012-07-17 05:04:16
              17Lightweight version of ˇ-Cipher

              Lightweight version of ˇ-Cipher

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2015-07-20 09:35:31
                18Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

                Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-05-23 08:52:57
                  19Lightweight version of π-Cipher  Hristina Mihajloska, Mohamed El Hadedy, Danilo Gligoroski and Kevin Skadron Department of Computer Science University of Virginia

                  Lightweight version of π-Cipher Hristina Mihajloska, Mohamed El Hadedy, Danilo Gligoroski and Kevin Skadron Department of Computer Science University of Virginia

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  - Date: 2015-07-20 09:29:07
                    20TCG 火焰之纹章0(Cipher)综合规则 Ver. 1.05  目录 1.  游戏与玩家

                    TCG 火焰之纹章0(Cipher)综合规则 Ver. 1.05 目录 1. 游戏与玩家

                    Add to Reading List

                    Source URL: 7xjwb8.com1.z0.glb.clouddn.com

                    - Date: 2016-06-01 13:13:28