Shamir

Results: 186



#Item
171Hebrew calendar / Jewish holiday / Chol HaMoed / Shabbat / Omer / Iyar / Nisan / Jewish culture / Passover / Hallel

1 2

Add to Reading List

Source URL: www.shamir.lv

Language: English - Date: 2010-01-29 05:08:44
172Gaza War / Israeli–Palestinian conflict / Islam / Hamas / Israel–Gaza conflict / International Law and the Gaza War / Israeli–Palestinian conflict / Palestinian territories / Gaza

Operation Pillar of Defense: An Initial Strategic and Military Assessment by Dr. Eitan Shamir

Add to Reading List

Source URL: www.biu.ac.il

Language: English - Date: 2012-12-04 17:19:00
173Block cipher / Cryptanalysis / Symmetric-key algorithm / Cipher / One-time pad / Padding / Index of cryptography articles / FEAL / Cryptography / Differential cryptanalysis / Eli Biham

Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti

Add to Reading List

Source URL: webcourse.cs.technion.ac.il

Language: English - Date: 2006-11-05 09:06:55
174

Microsoft Word - Shamir_Ziva.doc

Add to Reading List

Source URL: portal.idc.ac.il

Language: Hebrew - Date: 2012-10-19 14:06:30
    175Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Monitor mode / Cryptography / Wireless networking / Computer network security

    Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Adam Stubblefield∗

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2002-02-11 23:45:01
    176Functional languages / Q / Factorial / Fluhrer /  Mantin and Shamir attack / Mathematics / Cryptography / RC4

    Key Collisions of the RC4 Stream Cipher Mitsuru Matsui Information Technology R&D Center

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2009-04-15 07:57:11
    177ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

    Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

    Add to Reading List

    Source URL: wiki-files.aircrack-ng.org

    Language: English - Date: 2012-12-01 17:41:53
    178Fertile Crescent / Nationalism / Levant / Israeli–Palestinian conflict / Zionism / Israel Shamir / Palestinian people / Israel / Galilee / Western Asia / Asia / Middle East

    PDF Document

    Add to Reading List

    Source URL: www.vho.org

    Language: English - Date: 2007-08-20 14:15:14
    179Computational hardness assumptions / Electronic commerce / RSA / Cryptographic protocols / Leonard Adleman / Adi Shamir / Diffie–Hellman problem / Ron Rivest / Cipher / Cryptography / Public-key cryptography / Turing Award laureates

    PDF Document

    Add to Reading List

    Source URL: www.msri.org

    Language: English - Date: 2004-04-09 16:58:07
    180Prime Ministers of Israel / Politics / Yitzhak Rabin / Shimon Peres / Menachem Begin / Camp David Accords / Yitzhak Shamir / Ezer Weizman / Palestine Liberation Organization / Politics of Israel / Israeli Jews / Israel

    PDF Document

    Add to Reading List

    Source URL: www.ajcarchives.org

    Language: English - Date: 2006-10-13 15:29:21
    UPDATE