CS-Cipher

Results: 180



#Item
71IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
72Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
73Classical cipher / The Alphabet Cipher / Computer programming / Computing / Software engineering

PANEL DISCUSSION UNDER WHAT CONDITIONS CAN A MACHINE ATTRIBUTE MEANINGS TO SYMBOLS Aaron SLoman (Panel Chairman) U n i v e r s i t y of Sussex

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2008-09-30 05:16:20
74Grille / Caesar cipher / Substitution cipher / Classical cipher / Cryptography / Cipher / Code

Caesar’s Ciphers: Ms.Danielson _http://shodor.org/interactivate/activities/CaesarCipher/_ The History of Ciphers[removed]From: http://www.cs.usask.ca/content/resources/csconcepts/1999_3/lessons/L1/History.html). _Crypto

Add to Reading List

Source URL: www.cobblearning.net

Language: English - Date: 2011-10-01 09:06:00
75Kinematics / Calculus / Science / Constraint algorithm / Four-square cipher / Physics / Mathematical optimization / Optimal control

~ l, ComputerGraphics,Volume 22, Number4, August 1988

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2011-01-10 14:15:14
76Software engineering / Classical cipher / Index of agriculture articles / Computer programming / Latin alphabets / Computing

A Study of Smoothing Methods for Language Models Applied to Ad Hoc Information Retrieval Chengxiang Zhai John Lafferty

Add to Reading List

Source URL: sifaka.cs.uiuc.edu

Language: English - Date: 2001-09-18 10:20:56
77Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
78Mathematics / Pseudorandom number generators / Permutations / Pseudorandomness / Key / Random permutation / Entropy / Symmetric-key algorithm / Cipher / Cryptography / Randomness / Applied mathematics

Microsoft PowerPoint - random1

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
79Classical cipher / Wave equation / Mathematical analysis / Calculus / Computer programming

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
80Classical cipher / Wave equation / Mathematical analysis / Calculus / Computer programming

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
UPDATE