41![M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]. M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].](https://www.pdfsearch.io/img/ec3d91e8525f05ca7c02526f1d1a7343.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 1998-02-09 17:09:39
|
---|
42![Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore](https://www.pdfsearch.io/img/c8d8ccc10b846c517bb69792a954dc2e.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2005-06-03 08:04:08
|
---|
43![Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.](https://www.pdfsearch.io/img/cb61655a1662a72340d91a80f13e25af.jpg) | Add to Reading ListSource URL: web.eecs.utk.eduLanguage: English - Date: 2004-12-30 09:37:46
|
---|
44![A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton](https://www.pdfsearch.io/img/255a21aabaacd0b1f1ba95287896d0b3.jpg) | Add to Reading ListSource URL: www.cs.berkeley.eduLanguage: English - Date: 2008-10-23 15:16:37
|
---|
45![1 The Cipher SHARK 1 The Cipher SHARK](https://www.pdfsearch.io/img/6b0ead4862b72949f86748a75c6692f8.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English |
---|
46![Sinople: a 128-bit symmetric block cipher Sinople: a 128-bit symmetric block cipher](https://www.pdfsearch.io/img/2fa71cfba57ef0cee3e5598c02ba6999.jpg) | Add to Reading ListSource URL: www.philippepaquet.comLanguage: English - Date: 2011-01-20 03:20:41
|
---|
47![A New Class of Weak Keys for Blowfish Orhun Kara and Cevat Manap ¨ ITAK A New Class of Weak Keys for Blowfish Orhun Kara and Cevat Manap ¨ ITAK](https://www.pdfsearch.io/img/dbf38fc842906863ef6f1919bacf0df3.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2009-07-29 02:01:14
|
---|
48![Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore](https://www.pdfsearch.io/img/c01a19d4ab4099509fe680cfd9a9340a.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2007-03-29 16:42:09
|
---|
49![1 Improved SQUARE Attacks Against 1 Improved SQUARE Attacks Against](https://www.pdfsearch.io/img/adcd0ef332545d91db87dd641a73156c.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English |
---|
50![PUBLISHED JANUARY 2011 PUBLISHED JANUARY 2011](https://www.pdfsearch.io/img/25a8567b9f79ab5ff08d37366f53a0dc.jpg) | Add to Reading ListSource URL: www.fish.wa.gov.auLanguage: English - Date: 2012-04-25 20:58:58
|
---|