Permutation

Results: 881



#Item
611Permutation / Factorial / Combination / Mathematics / Combinatorics / Discrete mathematics

Permutations Leading to Combinations Appropriate Level Leaving Certificate Higher

Add to Reading List

Source URL: www.projectmaths.ie

Language: English - Date: 2011-08-09 06:05:06
612Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
613Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
614Permutation / Partition / Degree of a continuous mapping / Multiset / Mathematics / Combinatorics / Keccak

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-10-20 06:43:59
615Functional analysis / Linear algebra / Matrix theory / Numerical linear algebra / Singular value decomposition / Logarithm / Random permutation statistics / Randomized algorithm / Mathematics / Algebra / Mathematical analysis

Improved Recommendation Systems∗ Extended Abstract Baruch Awerbuch† Boaz Patt-Shamir‡

Add to Reading List

Source URL: www.markrtuttle.com

Language: English - Date: 2007-04-26 00:00:00
616Substitution-permutation network / ICE / Linear cryptanalysis / Differential cryptanalysis / S-box / Lucifer / Q / Canonical form / Data Encryption Standard / Cryptography / Block ciphers / Permutations

Cryptographic Analysis of All 4 × 4-Bit S-Boxes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
617Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
618Symmetric functions / Representation theory of finite groups / Algebraic combinatorics / Enumerative combinatorics / Catalan number / Young tableau / Permutation / Binary tree / Robinson–Schensted–Knuth correspondence / Mathematics / Combinatorics / Algebra

Parking functions to non-decreasing parking function

Add to Reading List

Source URL: www.findstat.org

Language: English - Date: 2014-04-30 04:42:48
619Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:16
620ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
UPDATE