CS-Cipher

Results: 180



#Item
141The Next 700 Programming Languages P. J. Landin Univac Division of Sperry Rand Corp., New York, New York

The Next 700 Programming Languages P. J. Landin Univac Division of Sperry Rand Corp., New York, New York

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-09-13 14:59:50
142Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
143Some Techniques for Solving Recurrences GEORGE S. LUEKER Department of Information and Computer Scwnce, Unwers~ty of California, lrvine, California 92717

Some Techniques for Solving Recurrences GEORGE S. LUEKER Department of Information and Computer Scwnce, Unwers~ty of California, lrvine, California 92717

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2009-09-02 15:33:25
144The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International

The Byzantine Generals Problem LESLIE LAMPORT, ROBERT SHOSTAK, and MARSHALL PEASE SRI International

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2002-12-06 15:16:33
145A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

A Tutorial on Slide Attacks By Chalermpong Worawannotai and Isabelle Stanton

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2008-10-23 15:16:37
146Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Nonce-Based Symmetric Encryption Phillip Rogaway Dept. of Computer Science, University of California, Davis, CA 95616, USA, and

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-01 14:57:44
147Mining Time-Changing Data Streams Geoff Hulten Dept. of ComputerScience

Mining Time-Changing Data Streams Geoff Hulten Dept. of ComputerScience

Add to Reading List

Source URL: www.cs.uiuc.edu

Language: English - Date: 2002-09-12 11:34:56
148Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
149CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2003-12-03 13:40:14
150To appear in  J. of Cryptology

To appear in J. of Cryptology

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2008-09-21 22:35:16