Permutation

Results: 881



#Item
771CMAC / Cryptographic hash functions / Tiny Encryption Algorithm / VMAC / Padding / Block cipher modes of operation / Block cipher / Permutation / Universal hashing / Cryptography / Message authentication codes / Mathematics

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2003-12-03 13:40:14
772One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Combinatorics / Mathematics

Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
773

3. Mehr zu Permutationen Definition 3.1. Ein r-Tupel (a1 , . . . , ar ) ∈ [n] r heißt Zykel der Permutation σ ∈ Sn , falls σ(ai ) = ai+1 , 1 ≤ i ≤ r − 1, und σ(ar ) = a1 . Der Zykel heißt

Add to Reading List

Source URL: www.mathematik.uni-marburg.de

Language: German - Date: 2008-01-14 04:27:35
    774Combinatorics / Abstract algebra / Permutation

    5.8. Proof.

    Add to Reading List

    Source URL: sss.sci.ibaraki.ac.jp

    Language: English - Date: 2007-04-19 04:41:25
    775Group theory / Abstract algebra / Functions and mappings / Parity of a permutation / Function / Symmetric group / Summation / Orbifold / Rearrangement inequality / Mathematics / Combinatorics / Permutations

    Discrete Mathematics and Theoretical Computer Science 4, 2001, 101–108 A permutation representation that knows what

    Add to Reading List

    Source URL: www.emis.de

    Language: English - Date: 2005-10-17 15:50:38
    776Data Encryption Standard / Group action / XTR / Permutation / Three-pass protocol / Naccache–Stern cryptosystem / Cryptography / Abstract algebra / Finite fields

    Is the Data Encryption Standard a group? (Results of cycling experiments on DES)

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2013-06-02 16:24:32
    777GMR / Digital signature / Permutation / RSA / BLS / Cryptography / Public-key cryptography / Claw-free permutation

    A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks* (Revision March 23, 1995) Shafi Goldwasser∗∗

    Add to Reading List

    Source URL: www.infosec.pku.edu.cn

    Language: English - Date: 2007-03-05 12:01:04
    778Mathematics / Estimation theory / Symbol / Orbifold / Differential cryptanalysis / Linear cryptanalysis / Permutation

    1 The Block Cipher Square

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English
    779Theoretical computer science / Insertion sort / Priority queue / Time complexity / Library sort / Chernoff bound / Permutation / Sequence container / Scapegoat tree / Mathematics / Order theory / Sorting algorithms

    I NSERTION S ORT is O(n log n) ∗ Michael A. Bender†

    Add to Reading List

    Source URL: www.cs.auckland.ac.nz

    Language: English - Date: 2007-02-06 19:39:51
    780Hash function / Claw-free permutation / Digital signature / Universal one-way hash function / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

    How to Time-Stamp a Digital Document Stuart Haber [removed]

    Add to Reading List

    Source URL: www.anf.es

    Language: English - Date: 2005-10-21 03:07:32
    UPDATE