First Page | Document Content | |
---|---|---|
![]() Date: 2007-03-29 16:18:56Cryptography Stream ciphers Cryptographic hash functions Message authentication codes VEST A5/1 Data Encryption Standard Block cipher modes of operation Confusion and diffusion Crypt Rabbit Key size | Add to Reading List |
![]() | The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik ZennerDocID: 1kO65 - View Document |
![]() | Christian Grothoff COMP 3704 Computer Security Christian GrothoffDocID: 1aIMB - View Document |
![]() | Diffusion or Confusion? International Economic Shocks and Democratization around the World Christian Houle University of RochesterDocID: 13Oar - View Document |
![]() | Real-time, Accurate Depth of Field using Anisotropic Diffusion and Programmable Graphics Cards Marcelo Bertalm´ıo and Pere Fort Departament de Tecnologia Universitat Pompeu Fabra AbstractDocID: 11S5c - View Document |
![]() | Substitution-Permutation Networks and Linear CryptanalysisDocID: mJD3 - View Document |