First Page | Document Content | |
---|---|---|
Date: 2011-07-10 02:35:13Index of cryptography articles Stream cipher FEAL Cipher WAKE RC5 Feistel cipher Differential cryptanalysis Cryptanalysis Cryptography Data Encryption Standard Block cipher | This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiAdd to Reading ListSource URL: cacr.uwaterloo.caDownload Document from Source WebsiteFile Size: 156,63 KBShare Document on Facebook |
CP-G10i-Flyer-v10.fh-2 [Converted]DocID: 1rapN - View Document | |
¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `DocID: 1qRIx - View Document | |
Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.DocID: 1qL92 - View Document | |
ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International JournalDocID: 1q9PC - View Document | |
Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R Équipe LFANT, Inria Bordeaux Sud-OuestDocID: 1q3yF - View Document |