Impossible

Results: 1185



#Item
461Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
462Christian mysticism / Christian literature / Middle English literature / The Cloud of Unknowing / Love of God / Heaven / Christian theology / Christianity / Religion

Trinity 14 Isaiah 35: 7; Mark 7: 24 Jesus found a house to stay in, and would like to have remained unrecognised, but that was impossible... The mirage will become a pool, the thirsty land

Add to Reading List

Source URL: www.stpatrickscathedral.ie

Language: English - Date: 2012-09-19 05:42:19
463Gin / Classic cocktails / Alcohol / Distillation / Cocktail / Martini

cocktails? Why are they called When defining the classic cocktail, it is impossible not to recall the sophisticated Golden Age of Hollywood,

Add to Reading List

Source URL: www.carmelterrys.com

Language: English - Date: 2011-10-28 21:57:07
464Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
465

Friedrich Ebert Stiftung Cameroun/ Afrique Centrale Assurer la sécurité en République Centrafricaine mission impossible ? Faouzi KILEMBE

Add to Reading List

Source URL: library.fes.de

Language: French - Date: 2015-04-07 12:42:16
    466Terex / Finance

    The Equipment You Need. At Competitive Rates. Want to grow your business… but the banks won’t talk to you? It’s impossible to realize your goals without investing in your business. However, have

    Add to Reading List

    Source URL: www.connexionpr.com.au

    Language: English - Date: 2012-11-27 21:23:43
    467Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

    KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-11-28 12:43:02
    468Theoretical computer science / K-nearest neighbor algorithm / Nearest neighbor search / Algorithm / Time complexity / Locality-sensitive hashing / Information science / Mathematics / Search algorithms

    Nearest Neighbor Search: the Old, the New, and the Impossible by Alexandr Andoni Submitted to the Department of Electrical Engineering and Computer Science

    Add to Reading List

    Source URL: www.mit.edu

    Language: English - Date: 2009-09-10 17:03:04
    469

    NO-LEAK AUTHENTICATION BY THE SHERLOCK HOLMES METHOD DIMA GRIGORIEV AND VLADIMIR SHPILRAIN “When you have eliminated the impossible, whatever remains, however improbable, must be the truth.”

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-02-08 08:43:53
      470Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

      New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2008-12-22 08:22:01
      UPDATE