Cryptanalysis

Results: 756



#Item
191Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
192Government Communications Headquarters / Cipher / Cryptanalysis / IPad / Apple Inc. / Mathematical sciences / Cryptography / Science

Fun cryptography app pleases students and teachers

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-06-18 01:16:25
193Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-20 11:59:02
194Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:33:26
195Permutation Groups and the Solution of German Enigma Cipher Jiˇr´ı Tuma ˚

Permutation Groups and the Solution of German Enigma Cipher Jiˇr´ı Tuma ˚

Add to Reading List

Source URL: www.karlin.mff.cuni.cz

Language: English - Date: 2005-03-16 09:19:23
196Microsoft PowerPoint - preneel_wroclaw_oct14_v1.pptx

Microsoft PowerPoint - preneel_wroclaw_oct14_v1.pptx

Add to Reading List

Source URL: www.informatics-europe.org

Language: English - Date: 2014-10-23 03:39:46
197Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
198Formally Certifying the Security of  Digital Signature Schemes

Formally Certifying the Security of Digital Signature Schemes

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
199This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
200Formally Certifying the Security of  Digital Signature Schemes

Formally Certifying the Security of Digital Signature Schemes

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36