Tiny Encryption Algorithm

Results: 130



#Item
11  New results on reduced-round Tiny Encryption Algorithm using genetic programming Karel Kubíˇcek, Jiˇrí Novotný, Petr Švenda, Martin Ukrop Masaryk University, Brno, Czech Republic

1 New results on reduced-round Tiny Encryption Algorithm using genetic programming Karel Kubíˇcek, Jiˇrí Novotný, Petr Švenda, Martin Ukrop Masaryk University, Brno, Czech Republic

Add to Reading List

Source URL: crocs.fi.muni.cz

Language: English - Date: 2018-04-25 10:30:18
    2Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

    Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

    Add to Reading List

    Source URL: cs.tau.ac.il

    Language: English - Date: 2009-06-25 15:56:23
    3DayAfternoon I 14:30 – 16:00

    DayAfternoon I 14:30 – 16:00

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English
    4University of California, Berkeley – College of Engineering Spring 2014 Department of Electrical Engineering and Computer Sciences Instructor: Dr. Dan Garcia

    University of California, Berkeley – College of Engineering Spring 2014 Department of Electrical Engineering and Computer Sciences Instructor: Dr. Dan Garcia

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2014-03-13 04:39:41
    5Microsoft Word - ISTQB_CTFL_Syll 2011.docx

    Microsoft Word - ISTQB_CTFL_Syll 2011.docx

    Add to Reading List

    Source URL: www.mstb.org

    Language: English - Date: 2011-12-12 02:20:26
    6An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

    An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-03-29 16:43:02
    7Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

    Trace Driven Cache Attacks against AES Advisor(s): Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    Language: English - Date: 2015-11-30 11:00:03
    8Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury  Deepak Garg

    Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    9Push-to-Pull Peer-to-Peer Live Streaming Thomas Locher, Remo Meier, Stefan Schmid, and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert,remmeier,schmiste

    Push-to-Pull Peer-to-Peer Live Streaming Thomas Locher, Remo Meier, Stefan Schmid, and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert,remmeier,schmiste

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    Language: English - Date: 2015-05-18 12:16:10
    10CONTENTS Preface iii  Organizing Committees

    CONTENTS Preface iii Organizing Committees

    Add to Reading List

    Source URL: www.icste.org

    Language: English - Date: 2013-11-22 05:19:37