Tiny Encryption Algorithm

Results: 130



#Item
21Verifying Temporal Heap Properties Specified via Evolution Logic? Eran Yahav1 , Thomas Reps2 , Mooly Sagiv1 , and Reinhard Wilhelm3 1  School of Comp. Sci., Tel-Aviv Univ., Tel-Aviv, Israel, {yahave,msagiv}@post.tau.ac.i

Verifying Temporal Heap Properties Specified via Evolution Logic? Eran Yahav1 , Thomas Reps2 , Mooly Sagiv1 , and Reinhard Wilhelm3 1 School of Comp. Sci., Tel-Aviv Univ., Tel-Aviv, Israel, {yahave,msagiv}@post.tau.ac.i

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2004-11-16 12:33:58
22Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
23An Optimal Strategy Improvement Algorithm for Solving Parity and Payoff Games⋆ Sven Schewe Universit¨ at des Saarlandes and University of Liverpool

An Optimal Strategy Improvement Algorithm for Solving Parity and Payoff Games⋆ Sven Schewe Universit¨ at des Saarlandes and University of Liverpool

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2008-09-11 12:26:42
24Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Beyond Provable Security Verifiable IND-CCA Security of OAEP Gilles Barthe1 , Benjamin Gr´egoire2, Yassine Lakhnech3 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
25Microsoft WordAWMA Vic Program Confirmed Speakers as at 26Feb2015.doc

Microsoft WordAWMA Vic Program Confirmed Speakers as at 26Feb2015.doc

Add to Reading List

Source URL: www.awma.com.au

Language: English - Date: 2015-02-26 06:44:25
26Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, and Amr M. Youssef Abstract Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In thi

Fault Analysis of Kuznyechik Riham AlTawy, Onur Duman, and Amr M. Youssef Abstract Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. In thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-17 22:22:42
27Microsoft Word - ISTQB_CTFL_Syll 2011.docx

Microsoft Word - ISTQB_CTFL_Syll 2011.docx

Add to Reading List

Source URL: www.software-tester.ch

Language: English - Date: 2011-04-04 03:57:26
28Simplessi  Un k simplesso è definito come la combinazione convessa di k+1 punti non linearmente dipendenti  Fondamenti di

Simplessi  Un k simplesso è definito come la combinazione convessa di k+1 punti non linearmente dipendenti Fondamenti di

Add to Reading List

Source URL: vcg.isti.cnr.it

Language: English - Date: 2005-09-21 12:03:28
29Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
30TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

Add to Reading List

Source URL: www.movable-type.co.uk

Language: English - Date: 2009-06-02 07:28:40