<--- Back to Details
First PageDocument Content
University of North Carolina at Chapel Hill / Carrboro /  North Carolina / Kevin Foy / Durham /  North Carolina / North Carolina / Research Triangle /  North Carolina / Chapel Hill Transit
Date: 2006-06-12 15:48:00
University of North Carolina at Chapel Hill
Carrboro
North Carolina
Kevin Foy
Durham
North Carolina
North Carolina
Research Triangle
North Carolina
Chapel Hill Transit

@1 T}iE UNI\/ERSITY oJ NORTH

Add to Reading List

Source URL: www.unc.edu

Download Document from Source Website

File Size: 1,94 MB

Share Document on Facebook

Similar Documents

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document

Search algorithms / Game artificial intelligence / Combinatorial optimization / Mathematics / Information science / Information retrieval / Artificial intelligence / Routing algorithms / Automated planning and scheduling / A* search algorithm / Heuristic / Incremental heuristic search

Planning with Concurrent Execution Bence Cserna Department of Computer Science University of New Hampshire Durham, NHUSA

DocID: 1xUAx - View Document

Cryptography / Stream ciphers / VEST / Grain / Field-programmable gate array / Altera / Xilinx / Brute-force attack / Stratix / Block cipher / Py / Data Encryption Standard

A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

DocID: 1xTNL - View Document

PDF Document

DocID: 1vTEj - View Document

PDF Document

DocID: 1vHqF - View Document