Data Encryption Standard

Results: 514



#Item
41J. Cryptology:Journal of CryptologyInternational Association for  Cryptologic Research

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
42: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2012-11-01 12:03:04
43A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
441  Standardization for the black hat Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven

1 Standardization for the black hat Daniel J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven

Add to Reading List

Source URL: www.cryptoexperts.com

Language: English - Date: 2016-05-30 09:49:30
45The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-06-30 14:22:04
46Microsoft Word - Arkansas FY 2009 FTR

Microsoft Word - Arkansas FY 2009 FTR

Add to Reading List

Source URL: datapreservation.usgs.gov

Language: English - Date: 2014-10-21 19:08:57
47Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
48EFF:  https://w2.eff.org/Privacy/Digital_money/?f=digicash.announce.txt Donate to EFF Enter search terms

EFF: https://w2.eff.org/Privacy/Digital_money/?f=digicash.announce.txt Donate to EFF Enter search terms

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:39
49CP-G10i-Flyer-v10.fh-2 [Converted]

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-02-03 15:53:09
502015 IEEE Symposium on Security and Privacy  Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:14