<--- Back to Details
First PageDocument Content
Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography
Date: 2013-08-28 07:53:23
Cryptography
Applied mathematics
Block cipher
Stream cipher
Cryptographic hash function
Cryptanalysis
Data Encryption Standard
Joan Daemen
VEST
Cipher
Symmetric-key algorithm
Selected Areas in Cryptography

Add to Reading List

Source URL: jda.noekeon.org

Download Document from Source Website

File Size: 1,59 MB

Share Document on Facebook

Similar Documents

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

DocID: 1rEjw - View Document

Information science / Information retrieval / Hashing / Countmin sketch / Recommender system / MinHash / K-nearest neighbors algorithm / Feature hashing / Cryptographic hash function / Collaborative filtering

POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

DocID: 1roz3 - View Document

Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

DocID: 1rmtA - View Document

Information retrieval / Search algorithms / Information science / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Universal hashing / Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

DocID: 1rivo - View Document