Feistel cipher

Results: 113



#Item
61Colloquium Spring[removed]Computer Science Colloquium Seventeenth Series - Spring 2003 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule Adv

Colloquium Spring[removed]Computer Science Colloquium Seventeenth Series - Spring 2003 CS DEPARTMENT School of Science & Technology Sonoma State University Prospective Students People Current Classes Catalog & Schedule Adv

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2010-09-07 14:47:13
62American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

American Journal of Engineering Research (AJER[removed]American Journal of Engineering Research (AJER) e-ISSN : [removed]p-ISSN : [removed]

Add to Reading List

Source URL: www.ajer.org

Language: English - Date: 2014-07-28 18:08:04
63

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
64

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
65Draft Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption

Draft Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-07-08 10:45:13
66Addendum to “The FFX Mode of Operation for Format-Preserving Encryption” A parameter collection for enciphering strings of arbitrary radix and length M. Bellare1

Addendum to “The FFX Mode of Operation for Format-Preserving Encryption” A parameter collection for enciphering strings of arbitrary radix and length M. Bellare1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:19:39
67ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
68ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
69Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
70QDBS GPS Tracking Integration

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50