Lex

Results: 2609



#Item
601

Hotarire nrtext procesat prin programul LEX EXPERT HOTĂRÂRE Nr. 136 din 13 martie 2012 privind aprobarea bugetului de venituri şi cheltuieli pe anul 2012 al Fondului pentru mediu, al Administraţiei Fond

Add to Reading List

Source URL: www.afm.ro

Language: Romanian - Date: 2013-04-09 08:25:39
    602Mobile application development / Mobile device / Automatic identification and data capture / Computing / Software engineering / .mobi

    LEX_Launch_Content_Highlight_Close_CMYK

    Add to Reading List

    Source URL: perceptivesoftware.com

    Language: English - Date: 2015-05-15 22:44:28
    603

    Contact: Lex Blintzios E: T: W: www.o3gallery.co.uk PRESS RELEASE – For immediate release

    Add to Reading List

    Source URL: www.o3gallery.co.uk

    Language: English - Date: 2015-01-09 08:22:31
      604Information technology / Information technology management / Workflow technology / Business software / Dashboard / Enterprise content management / Workflow / Oracle Business Intelligence Suite Enterprise Edition / Business / Data management / Business intelligence

      LEX_Launch_Content_Highlight_Close_CMYK

      Add to Reading List

      Source URL: perceptivesoftware.com

      Language: English - Date: 2015-05-15 22:28:57
      605Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

      Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2011-12-30 14:28:01
      606

      Otext procesat prin programul LEX EXPERT ORDIN Nrdin 10 septembrie 2010 pentru aprobarea Ghidului de finanţare a Programului vizând protecţia resurselor de apă, sisteme integrate de a

      Add to Reading List

      Source URL: www.afm.ro

      Language: Romanian - Date: 2013-04-12 06:25:04
        607SOSEMANUK / Trivium / Rabbit / Grain / HC-256 / MICKEY / CyaSSL / LEX / Computing / Stream ciphers / Salsa20 / ESTREAM

        ICTECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information and Communication Technologies

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2012-01-19 12:15:12
        608Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

        Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2008-12-12 10:35:54
        609Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

        Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-02-23 12:55:44
        610Salsa20 / LEX / Trivium / MICKEY / VEST / SOSEMANUK / Grain / Dragon / Phelix / Stream ciphers / Cryptography / ESTREAM

        Hardware evaluation of eSTREAM Candidates: Grain, Lex, Mickey128, Salsa20 and Trivium Marcin Rogawski PROKOM Software S.A. Warsaw, Grójecka 127

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2007-02-22 22:31:58
        UPDATE