NESSIE

Results: 131



#Item
111NESSIE / Block cipher / Symmetric-key algorithm / Cryptographic hash function / Outline of cryptography / Cryptography / Cryptography standards / CRYPTREC

Overview of CRYPTREC Activities January 28, 2002 Hideki Imai, Professor, University of Tokyo, CRYPTREC Advisory Committee Chair, CRYPTREC Evaluation Committee Chair

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
112Loch Ness / The Loch / Ness / Geography of Scotland / Geography of the United Kingdom / Scotland / Cryptozoology / Scottish folklore / Loch Ness Monster

Government protection for ‘Nessie’ – NAS ref. HH1/588, p76 LOCAL RESIDENT: “Ye puir feckless beastie – get oot o’ sicht while ye’re safe! D’ye no ken the Hoose o’ Commons, Nineteen-thirty-three, has it

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2010-04-19 11:41:13
113Loch Ness Monster / Geography of the United Kingdom / Loch Ness / Highland / Ness / Inverness / Loch Ness Monster in popular culture / Scottish folklore / Geography of Scotland / Cryptozoology

Government protection for ‘Nessie’ – NAS ref. HH1/588, p31 Government protection for ‘Nessie’ – National Archives of Scotland April 2010 http://www.nas.gov.uk/about[removed]asp

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2010-04-19 11:41:12
114Management / Industrial relations / Labor history / Overtime / Working time / Sick leave / Joliet Regional Port District / Human resource management / Employment compensation / Labour relations

Microsoft Word - SOEEA_Reporting_Policy_APCS_100608.doc

Add to Reading List

Source URL: nessie.uihr.uillinois.edu

Language: English - Date: 2008-10-07 11:08:15
115Bologna Process / European Higher Education Area / Educational policies and initiatives of the European Union / Student loan

Microsoft Word - NESSIE_Report_260809 comments meeting copenhagen[removed]doc

Add to Reading List

Source URL: www.ond.vlaanderen.be

Language: English - Date: 2009-10-09 11:18:31
116SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
117NESSIE / Outline of cryptography / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

FOR IMMEDIATE RELEASE February 27, 2003 Bart Preneel [removed]

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 16:57:52
118SOBER / SAFER / SHACAL / Cryptographic hash function / Q / MISTY1 / SHA-2 / Whirlpool / Camellia / Cryptography / Block ciphers / NESSIE

Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 15:34:08
119COSIC / Bart Preneel / Py / RC4 / MESH / RIPEMD / NESSIE / One-way compression function / Len Sassaman / Cryptography / Stream ciphers / Cryptographic hash functions

Publication List Bart PRENEEL Full professor KU Leuven

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-07-17 18:23:56
120Q / International Data Encryption Algorithm / NESSIE / Serpent / SAFER / Block ciphers / Cryptography / NOEKEON

Noekeon Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen** *Proton World, Brussels **COSIC, Leuven

Add to Reading List

Source URL: gro.noekeon.org

Language: English - Date: 2013-02-27 15:26:38
UPDATE