Cist

Results: 67



#Item
11

Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1 Center for Information Security Technologies (CIST)

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    12

    第六届中国国际摩擦学会议 (6th CIST) ) (2011 年 8 月 19 日~22 日,中国 兰州) 兰州) 由中国科学院兰州化学物理研究所固体润滑国家重点实验室、清华大学摩擦

    Add to Reading List

    Source URL: lsl.licp.cas.cn

    Language: Chinese
      13

      Kapitola 1 Základní pojmy Už od starověku se lidé snaží předávat zprávy tak, aby je mohl číst pouze adresát a nikdo jiný. Je-li zpráva napsána ručně a doručována otrokem (jak tomu bylo ve starém Ře

      Add to Reading List

      Source URL: www.karlin.mff.cuni.cz

      Language: Czech
        14

        Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:35
          15

          Chcete se naučit číst 2x efektivněji? ROZEČTI.SE Průměrná počáteční rychlost uživatele je 210 slov za minutu. Průměrné zlepšení na uživatele je 165%, a to po

          Add to Reading List

          Source URL: www.knihomol.wz.cz

          - Date: 2015-01-05 03:02:28
            16Navigation / Cist / Archaeology / Culture / Cairn

            Bucharn Cairn The Bronze Age burial cairn at Bucharn boasts wide views over the Water of Feugh in Aberdeenshire. The round cairn remains largely undisturbed, measuring up to 23m in diameter and up to 6.2m in height. It r

            Add to Reading List

            Source URL: scotland.forestry.gov.uk

            Language: English - Date: 2014-05-28 08:31:16
            17Archaeology of the Americas / Tumulus / Long barrow / Cairn / Cist / Archaeoastronomy / Chambered cairn / Round barrow / Chamber tomb / Archaeology / Barrows / Death customs

            PREHISTORIC BURIALS S cotland’s prehistory stretched for

            Add to Reading List

            Source URL: www.historic-scotland.gov.uk

            Language: English - Date: 2011-04-18 15:52:37
            18Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

            Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

            Add to Reading List

            Source URL: seed.kisa.or.kr

            Language: English
            19Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

            Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2006-12-24 08:27:19
            20Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

            Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2006-12-25 07:03:53
            UPDATE