FEAL

Results: 27



#Item
1The Uses of Memory: In the Time of the Butterflies and The Farming of Bones  Elsa Luciano Feal University of Puerto Rico, Arecibo Make an effort to remember. Or, failing that, invent. [Monica Wittig, Les guerilleres, 196

The Uses of Memory: In the Time of the Butterflies and The Farming of Bones Elsa Luciano Feal University of Puerto Rico, Arecibo Make an effort to remember. Or, failing that, invent. [Monica Wittig, Les guerilleres, 196

Add to Reading List

Source URL: amauta.upra.edu

Language: English - Date: 2013-02-15 09:39:30
    2ACCIÓN FORMATIVA: CURSO PINTOR/A ADMITIDOS/AS JOSÉ TIZÓN MARTÍNEZ ANTOLÍN RIOPEDRE MESA MANUEL FEAL BLANCO MANUEL FERNÁNDEZ RODRÍGUEZ

    ACCIÓN FORMATIVA: CURSO PINTOR/A ADMITIDOS/AS JOSÉ TIZÓN MARTÍNEZ ANTOLÍN RIOPEDRE MESA MANUEL FEAL BLANCO MANUEL FERNÁNDEZ RODRÍGUEZ

    Add to Reading List

    Source URL: www.ferrol.es

    - Date: 2012-06-27 05:56:48
      3This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13
      4This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2011-07-10 02:35:13
      5Dierential Cryptanalysis of DES-like Cryptosystems Eli Biham  Adi Shamir

      Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

      Add to Reading List

      Source URL: zoo.cs.yale.edu

      Language: English - Date: 2012-10-14 17:28:33
      6Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

      Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2005-06-27 11:00:28
      7Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

      Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-12-17 08:30:51
      8High Purity Metallic Materials  Prof. Akihisa Inoue (Concurreutly) 【Staff Members】 Prof. Akihisa Inoue, Assoc. Prof. Kyosuke Yoshimi, Res. Assoc. Tadashi Fukuda〈Researcher :1〉

      High Purity Metallic Materials Prof. Akihisa Inoue (Concurreutly) 【Staff Members】 Prof. Akihisa Inoue, Assoc. Prof. Kyosuke Yoshimi, Res. Assoc. Tadashi Fukuda〈Researcher :1〉

      Add to Reading List

      Source URL: www.review.imr.tohoku.ac.jp

      Language: English - Date: 2006-06-09 04:25:11
      93-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

      3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

      Add to Reading List

      Source URL: www.nict.go.jp

      Language: English - Date: 2005-09-28 07:38:35
      10Innes Willox, Chief Executive, Australian Industry Group Speech delivered to: FEAL (Fund Executives Association Ltd)

      Innes Willox, Chief Executive, Australian Industry Group Speech delivered to: FEAL (Fund Executives Association Ltd)

      Add to Reading List

      Source URL: www.aigroup.com.au

      Language: English - Date: 2015-03-04 23:03:20