Search alternatives:
cipher » ciphers

1
by Castle, Terry
Published 1982
Cornell University Press
... is the paradigmatic female victim. In Clarissa's Ciphers, Terry Castle delineates the ways in which, in a world where...

2
by Klein, Andreas
Published 2013
Springer London
Table of Contents: ...Introduction to Stream Ciphers -- Linear Feedback Shift Registers -- Non-linear Combinations...

3
National Security Agency
Subjects: ...Ciphers / fast / (OCoLC)fst00861549...

4
by Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
Published 2017
Springer International Publishing
Table of Contents: ...Part 1 Definitions and first security results -- Chapter 1 Classical Feistel ciphers, first...

5
by Knudsen, Lars R., Robshaw, Matthew
Published 2011
Springer Berlin Heidelberg
Table of Contents: ... Ciphers -- Brute-Force Attacks -- Differential Cryptanalysis -- Linear Cryptanalysis -- Advanced Topics...

6
by Sakiyama, Kazuo
Published 2015
Wiley
Table of Contents: ...Caused by Data Alternation 208 5.5 Fault Analysis on Block Ciphers 208 5.5.1 Differential Fault...

7
Published 2022
Manning Publications
...Find a practical way of doing the One-Time Pad Cipher...

8
by Cusick, Thomas W.
Published 1998
Elsevier
Table of Contents: ...Section Headings only. Preface. Introduction. Stream Ciphers. Primes, Primitive Roots and Sequences...

9
by Nakahara Jr., Jorge
Published 2018
Springer International Publishing
Table of Contents: ...Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A...

10
by Ding, Cunsheng
Published 1991
Springer

11
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...The eSTREAM Project -- CryptMT3 Stream Cipher -- The Dragon Stream Cipher: Design, Analysis...

12
by Cusick, Thomas W.
Published 2004
Elsevier
Table of Contents: ... Stream Ciphers. -- 3 Primes, Primitive Roots and Sequences. -- 4 Cyclotomy and Cryptographic Functions...

13
by Bannier, Arnaud
Published 2017
IntechOpen
Subjects: ...cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor...

14
by Rueppel, Rainer A.
Published 1986
Springer Berlin Heidelberg
Table of Contents: ...1. Introduction -- 2. Stream Ciphers -- 2.1. Theoretical versus Practical Security -- 2.2. The Key...

15
by Ding, Cunsheng, Xiao, Guozhen, Shan, Weijuan
Published 1991
Springer Berlin Heidelberg
Table of Contents: ...Stream ciphers -- The BAA attacks on several classes of stream ciphers -- Measure indexes...

16
by Hirota, Osamu
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...quantum cipher...

18
by Baksi, Anubhab, Jang, Kyungbae
Published 2024
Springer Nature Singapore
Table of Contents: ... Cipher Description Conclusion and Outlook...

19
by Wouves, P. R.
Published 1797
De l'imprimerie de Benjamin Franklin Bache, no. 112, rue de Marche/a1
Subjects: ...Cipher and telegraph codes...

20
by Paul, Goutam
Published 2012
CRC Press
Table of Contents: ...1. Introduction to cryptology -- 2. Stream ciphers and RC4 -- 3. Analysis of key scheduling -- 4...