Data Encryption Standard

Results: 514



#Item
1International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

Add to Reading List

Source URL: ijcsse.org

Language: English - Date: 2017-08-04 12:06:49
    2Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

    Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2016-01-11 11:15:52
      3emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

      emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

      Add to Reading List

      Source URL: changipowart.com

      Language: English - Date: 2015-07-21 22:08:39
      4Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL:   Phone

      Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL: Phone

      Add to Reading List

      Source URL: www.trinityelkton.org

      Language: English - Date: 2012-06-09 22:59:56
      5Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

      Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

      Add to Reading List

      Source URL: cs.tau.ac.il

      Language: English - Date: 2009-06-25 15:56:23
      6Crypto Device Drivers ReleaseJuly 28, 2016  CONTENTS

      Crypto Device Drivers ReleaseJuly 28, 2016 CONTENTS

      Add to Reading List

      Source URL: fast.dpdk.org

      Language: English - Date: 2016-07-28 16:30:34
      7CP-G10i-Flyer-v10.fh-2 [Converted]

      CP-G10i-Flyer-v10.fh-2 [Converted]

      Add to Reading List

      Source URL: www.cryptophone.de

      Language: English - Date: 2010-07-06 09:32:52
      8Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

      Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      9Aspects and Consequences of Multi-Party Non-Locality Master Thesis Helen Ebbe Department of Mathematics, ETH Z¨urich

      Aspects and Consequences of Multi-Party Non-Locality Master Thesis Helen Ebbe Department of Mathematics, ETH Z¨urich

      Add to Reading List

      Source URL: cqi.inf.usi.ch

      Language: English - Date: 2013-06-03 09:37:44
      10DELRAY BEACH CRA ARTS WAREHOUSE RENOVATIONS DELRAY BEACH, FLORIDA PROJECT SPECIFICATIONS TABLE OF CONTENTS Section

      DELRAY BEACH CRA ARTS WAREHOUSE RENOVATIONS DELRAY BEACH, FLORIDA PROJECT SPECIFICATIONS TABLE OF CONTENTS Section

      Add to Reading List

      Source URL: delraycra.org

      Language: English - Date: 2016-05-01 21:37:00