Data Encryption Standard

Results: 514



#Item
91Introduction to Time Series Analysis. Lecture 1. Peter Bartlett 1. Organizational issues. 2. Objectives of time series analysis. Examples. 3. Overview of the course. 4. Time series models.

Introduction to Time Series Analysis. Lecture 1. Peter Bartlett 1. Organizational issues. 2. Objectives of time series analysis. Examples. 3. Overview of the course. 4. Time series models.

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2010-08-26 19:53:36
92Microsoft Word - Reconfig2013_cr_v01.doc

Microsoft Word - Reconfig2013_cr_v01.doc

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2013-11-15 15:24:17
93IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

Add to Reading List

Source URL: euler.ecs.umass.edu

Language: English - Date: 2014-03-28 15:45:17
94Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
95Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
96Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury  Deepak Garg

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
97The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:56
98KeeLoq  Robert R. Enderlein School of Computer and Communication Sciences Semester Project

KeeLoq Robert R. Enderlein School of Computer and Communication Sciences Semester Project

Add to Reading List

Source URL: www.e7n.ch

Language: English
99The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:38
100Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:16