Welcome, Guest.Sign in for full access to IOU Digital Library's resources.

Welcome to IOU Digital Library

Page 1 | Results on this page: 10 | Digital Books: 127 | Physical Books: 0

A cryptanalysis of Step_k,m-cascades

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 clock-controlled generator cascade ciphers stream ciphers

Published in: 101

Availability: 1 of 1(eBook)

By: Gollmann D.

A cryptographic library for the Motorola DSP 56000

Subjects: Advances in Cryptology - EuroCrypt '90 Lecture Notes in Computer Science Volume 473 cryptographic coprocessors modular arithmetic Montgomery multiplication software libraries

Published in: 101

Availability: 1 of 1(eBook)

By: Dusse S. R.

A fast correlation attack on nonlinearly feed-forward filtered shift-register sequences

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Forre R.

A fast elliptic curve cryptosystem

Subjects: Advances in Cryptology - EuroCrypt '89 Lecture Notes in Computer Science Volume 434 efficient algorithms elliptic curve cryptosystem

Published in: 101

Availability: 1 of 1(eBook)

By: Agnew G. B. Mullin R. C.

A general lower bound for the linear complexity of the product of shift-register sequences

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 linear complexity

Published in: 101

Availability: 1 of 1(eBook)

By: Goettfert R.

A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma

Subjects: Advances in Cryptology - EuroCrypt '95 Lecture Notes in Computer Science Volume 921 piling-up lemma SAFER cryptanalysis IDEA block cipher linear cryptanalysis Data Encryption Standard

Published in: 101

Availability: 1 of 1(eBook)

By: Harpes C. Kramer G. G.

A generalized birthday attack

Subjects: Advances in Cryptology - EuroCrypt '88 Lecture Notes in Computer Science Volume 330 birthday attack

Published in: 101

Availability: 1 of 1(eBook)

By: Girault M.

A generalized correlation attack with a probabilistic constrained edit distance

Subjects: Advances in Cryptology - EuroCrypt '92 Lecture Notes in Computer Science Volume 658 correlation attack

Published in: 101

Availability: 1 of 1(eBook)

By: Golic J. D.

A linear construction of perfect secret sharing schemes

Subjects: Advances in Cryptology - EuroCrypt '94 Lecture Notes in Computer Science Volume 950 secret sharing perfect secret sharing

Published in: 101

Availability: 1 of 1(eBook)

By: Dijk M. van

Fresh Arrivals