First Page | Document Content | |
---|---|---|
Date: 2012-04-20 07:04:20Block cipher Cryptanalysis Hellman Differential cryptanalysis Tiger Diffie–Hellman key exchange Index of cryptography articles Outline of cryptography Cryptography Cryptographic hash functions Cryptographic protocols | Microsoft PowerPoint - Rechberger_IDEA_v2Add to Reading ListSource URL: www.cs.bris.ac.ukDownload Document from Source WebsiteFile Size: 192,94 KBShare Document on Facebook |
CP-G10i-Flyer-v10.fh-2 [Converted]DocID: 1rapN - View Document | |
¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `DocID: 1qRIx - View Document | |
Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.DocID: 1qL92 - View Document | |
ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International JournalDocID: 1q9PC - View Document | |
Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R Équipe LFANT, Inria Bordeaux Sud-OuestDocID: 1q3yF - View Document |