Cist

Results: 67



#Item
11Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1  Center for Information Security Technologies (CIST)

Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1 Center for Information Security Technologies (CIST)

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    12第六届中国国际摩擦学会议 (6th CIST) ) (2011 年 8 月 19 日~22 日,中国 兰州) 兰州)  由中国科学院兰州化学物理研究所固体润滑国家重点实验室、清华大学摩擦

    第六届中国国际摩擦学会议 (6th CIST) ) (2011 年 8 月 19 日~22 日,中国 兰州) 兰州) 由中国科学院兰州化学物理研究所固体润滑国家重点实验室、清华大学摩擦

    Add to Reading List

    Source URL: lsl.licp.cas.cn

    Language: Chinese
      13Kapitola 1  Základní pojmy Už od starověku se lidé snaží předávat zprávy tak, aby je mohl číst pouze adresát a nikdo jiný. Je-li zpráva napsána ručně a doručována otrokem (jak tomu bylo ve starém Ře

      Kapitola 1 Základní pojmy Už od starověku se lidé snaží předávat zprávy tak, aby je mohl číst pouze adresát a nikdo jiný. Je-li zpráva napsána ručně a doručována otrokem (jak tomu bylo ve starém Ře

      Add to Reading List

      Source URL: www.karlin.mff.cuni.cz

      Language: Czech
        14Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

        Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:35
          15Chcete se naučit číst 2x efektivněji?  ROZEČTI.SE Průměrná počáteční rychlost uživatele je 210 slov za minutu. Průměrné zlepšení na uživatele je 165%, a to po

          Chcete se naučit číst 2x efektivněji? ROZEČTI.SE Průměrná počáteční rychlost uživatele je 210 slov za minutu. Průměrné zlepšení na uživatele je 165%, a to po

          Add to Reading List

          Source URL: www.knihomol.wz.cz

          - Date: 2015-01-05 03:02:28
            16Bucharn Cairn The Bronze Age burial cairn at Bucharn boasts wide views over the Water of Feugh in Aberdeenshire. The round cairn remains largely undisturbed, measuring up to 23m in diameter and up to 6.2m in height. It r

            Bucharn Cairn The Bronze Age burial cairn at Bucharn boasts wide views over the Water of Feugh in Aberdeenshire. The round cairn remains largely undisturbed, measuring up to 23m in diameter and up to 6.2m in height. It r

            Add to Reading List

            Source URL: scotland.forestry.gov.uk

            Language: English - Date: 2014-05-28 08:31:16
            17PREHISTORIC BURIALS S  cotland’s prehistory stretched for

            PREHISTORIC BURIALS S cotland’s prehistory stretched for

            Add to Reading List

            Source URL: www.historic-scotland.gov.uk

            Language: English - Date: 2011-04-18 15:52:37
            18Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1  Center for Information Security Technologies(CIST), Korea University, Kore

            Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

            Add to Reading List

            Source URL: seed.kisa.or.kr

            Language: English
            19Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

            Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2006-12-24 08:27:19
            20Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† †  Center for Information Security Technologies (CIST), Korea Unive

            Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2006-12-25 07:03:53