Cipher

Results: 21539



#Item
211  THE ARX STRUCTURE OF π-CIPHER

1 THE ARX STRUCTURE OF π-CIPHER

Add to Reading List

Source URL: imft.ftn.uns.ac.rs

- Date: 2015-09-30 13:38:11
    22On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

    On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2006-02-15 04:14:19
      23Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

      Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL ,

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2006-03-27 04:46:14
        24GEOGRAPHY EDUCATORS’ NETWORK OF INDIANA NEWSLETTER Volume 109, Issue 5  GA! 2009: Europe Beyond Borders

        GEOGRAPHY EDUCATORS’ NETWORK OF INDIANA NEWSLETTER Volume 109, Issue 5 GA! 2009: Europe Beyond Borders

        Add to Reading List

        Source URL: www.iupui.edu

        Language: English - Date: 2009-11-18 11:32:34
        25AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

        AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2015-02-21 21:04:37
        261644 43rd Avenue East, Seattle, WAF I S K E G E N E A L O G I C A L F O U N D AT I O N NEWSLETTER June 2004

        1644 43rd Avenue East, Seattle, WAF I S K E G E N E A L O G I C A L F O U N D AT I O N NEWSLETTER June 2004

        Add to Reading List

        Source URL: fiskelibrary.org

        Language: English - Date: 2009-04-07 12:49:08
        27SEN SIT IV IT Y A N A L Y SIS O F V A L U ES A T R ISK  C.G O U R IER O U X ,1 J. P.L A U R EN T  2

        SEN SIT IV IT Y A N A L Y SIS O F V A L U ES A T R ISK C.G O U R IER O U X ,1 J. P.L A U R EN T 2

        Add to Reading List

        Source URL: www.istfin.eco.usi.ch

        Language: English - Date: 2009-01-27 08:16:49
          28CENTRAL FLORIDA GENEALOGICAL AND HISTORICAL SOCIETY 5221 Ashmeade Road Orlando, FloridaVol, I I, Numbe·r 1 ~rs.

          CENTRAL FLORIDA GENEALOGICAL AND HISTORICAL SOCIETY 5221 Ashmeade Road Orlando, FloridaVol, I I, Numbe·r 1 ~rs.

          Add to Reading List

          Source URL: cfgs.org

          Language: English - Date: 2014-03-18 14:13:35
          29Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri

          Broadcast Federation: An Application-layer Broadcast Internetwork Yatin Chawathe Mukund Seshadri

          Add to Reading List

          Source URL: sahara.cs.berkeley.edu

          Language: English - Date: 2002-04-10 14:33:51
          30Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Add to Reading List

          Source URL: cs.tau.ac.il

          Language: English - Date: 2009-06-25 15:56:23