Search alternatives:
cipher » ciphers

1
by Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents: ...-Blum-Shub (BBS) Generators; Security Modes of PRSGs; Known Attacks Design of Stream Ciphers ; Design...

2
by Coleman, David D.
Published 2010
Wiley Pub.
Table of Contents: ... Security; Chapter 3: Encryption Ciphers and Methods; Chapter 4: Enterprise 802.11 Layer 2 Authentication...

3
by Schneier, Bruce
Published 1996
Wiley
... and South Africa, and the RC4 stream cipher The latest protocols for digital signatures, authentication...

4
by Pathak, Anirban
Published 2013
CRC Press
Table of Contents: ... Cryptography; Jargon related to cryptography; Some interesting classical ciphers; Different aspects of quantum...

5
by Horn, G?nther
Published 2010
John Wiley & Sons
Table of Contents: ... Mechanisms -- 4.2.1 Authentication and Key Agreement -- 4.2.2 Ciphering Mechanism -- 4.2.3 Integrity...

6
by Ahmadi, Sassan
Published 2019
Academic Press, an imprint of Elsevier
Table of Contents: ... -- 2.2.3.2 Header Compression Function -- 2.2.3.3 Ciphering and Integrity Protection Functions -- 2.2.4...

7
by Yi, SeungJune
Published 2012
John Wiley & Sons Singapore