131![Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories](https://www.pdfsearch.io/img/f43dc8089489ecc75bc50e03217a8274.jpg) | Add to Reading ListSource URL: www.crypto.comLanguage: English - Date: 2001-05-15 19:09:38
|
---|
132![The Extended Codebook (XCB) Mode of Operation David A. McGrew and Scott Fluhrer Cisco Systems, Inc. The Extended Codebook (XCB) Mode of Operation David A. McGrew and Scott Fluhrer Cisco Systems, Inc.](https://www.pdfsearch.io/img/7254b4aa1cca6941c248f7470ed308aa.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-10-25 16:41:00
|
---|
133![644 IEEE 644 IEEE](https://www.pdfsearch.io/img/7f9ec7539584bf89260b1a81322e61fc.jpg) | Add to Reading ListSource URL: www-ee.stanford.eduLanguage: English - Date: 2005-09-13 19:36:34
|
---|
134![Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and](https://www.pdfsearch.io/img/379a50eec2603c9a0d5a32db00f4a37b.jpg) | Add to Reading ListSource URL: www.cs.ucdavis.eduLanguage: English - Date: 2004-02-01 14:57:44
|
---|
135![Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov](https://www.pdfsearch.io/img/c4182b9c0cd8f3239bc5104171134230.jpg) | Add to Reading ListSource URL: www.cs.colorado.eduLanguage: English - Date: 2001-10-23 20:39:38
|
---|
136![Stream-Ciphers and Block-Ciphers Lecture 6 Stream-Ciphers and Block-Ciphers Lecture 6](https://www.pdfsearch.io/img/6eaf17d943b31912f6ef07f636cf83a7.jpg) | Add to Reading ListSource URL: www.cs.uiuc.eduLanguage: English - Date: 2007-10-25 08:48:59
|
---|
137![Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde Building Stream Ciphers from Block Ciphers and their Security Hans Christoph Hudde](https://www.pdfsearch.io/img/4ef8d9b9b6e06a665a1274f252ab2a77.jpg) | Add to Reading ListSource URL: www.emsec.rub.deLanguage: English - Date: 2011-03-28 05:53:29
|
---|
138![Author manuscript, published in Author manuscript, published in](https://www.pdfsearch.io/img/cc51ba27efe5139bc6805b8a72100166.jpg) | Add to Reading ListSource URL: hal.archives-ouvertes.frLanguage: English - Date: 2010-11-11 06:25:51
|
---|
139![Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗](https://www.pdfsearch.io/img/447215d2e077eb8d8f18084e0d71a83a.jpg) | Add to Reading ListSource URL: www.isoc.orgLanguage: English - Date: 2002-02-11 23:45:01
|
---|
140![Dragon: A Fast Word Based Stream Cipher K. Chen1 , M. Henricksen1 , W. Millan1 , J. Fuller1 , L. Simpson1 , E. Dawson1 , H. Lee2 , and S. Moon3 Dragon: A Fast Word Based Stream Cipher K. Chen1 , M. Henricksen1 , W. Millan1 , J. Fuller1 , L. Simpson1 , E. Dawson1 , H. Lee2 , and S. Moon3](https://www.pdfsearch.io/img/0b60cac27195a0608b3b57d8296257a4.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2007-03-29 16:18:53
|
---|