Standard algorithms

Results: 123



#Item
11Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
12The Algebraic Calculator and Mathematics Education Barry Kissane The Australian Institute of Education Murdoch University, Murdoch, Australia 6150

The Algebraic Calculator and Mathematics Education Barry Kissane The Australian Institute of Education Murdoch University, Murdoch, Australia 6150

Add to Reading List

Source URL: wwwstaff.murdoch.edu.au

Language: English - Date: 2000-10-04 22:23:52
13(Comparing) Hardware Complexity of Cryptographic Algorithms Liam Marnane University College Cork Claude Shannon Institute

(Comparing) Hardware Complexity of Cryptographic Algorithms Liam Marnane University College Cork Claude Shannon Institute

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:20
14Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
15The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:32:13
16Recap .... Array ............

Recap .... Array ............

Add to Reading List

Source URL: genome.sph.umich.edu

Language: English - Date: 2012-09-25 01:24:02
17Implementation of Multi-Standard Video Decoding Algorithms on a Coarse-Grained Reconfigurable Multimedia Processor

Implementation of Multi-Standard Video Decoding Algorithms on a Coarse-Grained Reconfigurable Multimedia Processor

Add to Reading List

Source URL: www.epapers.org

Language: English - Date: 2015-08-25 22:13:59
    18ITOS  Integrated Trade Optimization Service Inefficiency of standard implementation shortfall algorithms 

    ITOS Integrated Trade Optimization Service Inefficiency of standard implementation shortfall algorithms 

    Add to Reading List

    Source URL: www.northinfo.com

    Language: English - Date: 2011-03-20 11:35:29
    19Exchanging Files with PGP PGP by the PGP Corporation offers public key file encryption according to the RFCOpen PGP) standard using NIST standard algorithms, including AES-256, Diffie-Hellman/ DSS, and SHA-512. NS

    Exchanging Files with PGP PGP by the PGP Corporation offers public key file encryption according to the RFCOpen PGP) standard using NIST standard algorithms, including AES-256, Diffie-Hellman/ DSS, and SHA-512. NS

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2009-12-16 06:02:42
      20Parallelizing the Standard Algorithms Library | N3408=Jared Hoberock Michael Garland Olivier Giroux Vinod Grover

      Parallelizing the Standard Algorithms Library | N3408=Jared Hoberock Michael Garland Olivier Giroux Vinod Grover

      Add to Reading List

      Source URL: www.open-std.org

      Language: English - Date: 2012-09-21 10:49:00