41![Proceedings Template - WORD Proceedings Template - WORD](https://www.pdfsearch.io/img/91c2afa98fd633fb17b77b95eee9eab5.jpg) | Add to Reading ListSource URL: womencourage.acm.orgLanguage: English - Date: 2016-08-09 09:13:52
|
---|
42![Microsoft Word - NLA-monographdoc Microsoft Word - NLA-monographdoc](https://www.pdfsearch.io/img/3094d766b342c253bdec852d0b6ce3c4.jpg) | Add to Reading ListSource URL: foibg.comLanguage: English - Date: 2015-06-14 11:43:50
|
---|
43![Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation](https://www.pdfsearch.io/img/4f8400a439a45e3e20dcd6c5cef7e44b.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-09-08 06:00:03
|
---|
44![Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins](https://www.pdfsearch.io/img/fe00183e95a4dee2773828f3e7afefdc.jpg) | Add to Reading ListSource URL: vialab.science.uoit.caLanguage: English - Date: 2015-09-22 16:31:59
|
---|
45![Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP](https://www.pdfsearch.io/img/291179e46808d269ed81332759ff0445.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English - Date: 2013-09-19 10:37:36
|
---|
46![A Case Against Currently Used Hash Functions in RFID Protocols A Case Against Currently Used Hash Functions in RFID Protocols](https://www.pdfsearch.io/img/8ed82e26a223637ee2893df5dae10aa8.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2006-07-18 01:05:54
|
---|
47![Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx](https://www.pdfsearch.io/img/efe2160d2002ae10907bea1243de9af6.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2016-07-29 15:19:10
|
---|
48![Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2 Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2](https://www.pdfsearch.io/img/0900e8803134a1d1e9bcade44b62994d.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2008-07-20 11:55:06
|
---|
49![The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu](https://www.pdfsearch.io/img/16d24ddb2adb1aba95dc419c5c5c2daf.jpg) | Add to Reading ListSource URL: lmullen.github.ioLanguage: English - Date: 2016-08-13 18:01:55
|
---|
50![Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2 Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2](https://www.pdfsearch.io/img/f3a745e9d09ae00cc98e0e219e0cb123.jpg) | Add to Reading ListSource URL: keccak.noekeon.orgLanguage: English - Date: 2013-02-27 15:26:40
|
---|