41![Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface](https://www.pdfsearch.io/img/29c14b685cd655e7aa432f602185e6aa.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2013-03-20 04:32:08
|
---|
42![Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm](https://www.pdfsearch.io/img/5453de2fd690bdbf11df6dfdd100f699.jpg) | Add to Reading ListSource URL: engineering.purdue.eduLanguage: English - Date: 2015-03-06 14:47:12
|
---|
43![Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗](https://www.pdfsearch.io/img/89c5c03e285a7dba3d4a3670360bff9c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-16 07:03:25
|
---|
44![Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India](https://www.pdfsearch.io/img/47a66a7221e7f98f5dbc273b40bb43c1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-19 14:57:29
|
---|
45![LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications LNCSSEA: A Scalable Encryption Algorithm for Small Embedded Applications](https://www.pdfsearch.io/img/6e9970056eb54f816f8e5759a085345b.jpg) | Add to Reading ListSource URL: www.cba.mit.eduLanguage: English - Date: 2011-12-13 18:32:02
|
---|
46![Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics](https://www.pdfsearch.io/img/c477ac42aab4f17e3c39a405dbf491be.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-22 07:22:52
|
---|
47![](https://www.pdfsearch.io/img/b102b145fe3930a63bee34570489803a.jpg) | Add to Reading ListSource URL: www.sony.co.jpLanguage: English - Date: 2011-03-09 03:41:21
|
---|
48![Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088 Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088](https://www.pdfsearch.io/img/d6033fd0e598ce469660dcac88c0ead0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-26 13:35:03
|
---|
49![F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China](https://www.pdfsearch.io/img/4a39ad09b8111ecd08bd769524476623.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-08-20 23:47:47
|
---|
50![Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999 Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999](https://www.pdfsearch.io/img/4e1f2cb8e6351587dbedb0c1c4daf709.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|