alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 3 Results, Digital:3, Print: 0

Showing Page No. 1 , Digital:3, Print: 0

Differential cryptanalysis mod 232 with applications to MD5

By Berson, T. A.
101., ()

Subject: Advances in Cryptology - EuroCrypt '92; Lecture Notes in Computer Science Volume 658; differential cryptanalysis; MD5; MD5 hash function
Availability: 1 of 1(eBook)
Read More

Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack

By Berson, T. A.
101., ()

Subject: Advances in Cryptology - Crypto '97; Lecture Notes in Computer Science Volume 1294; McEliece cryptosystem; related message attack; replay attack
Availability: 1 of 1(eBook)
Read More

Innovations in Information Systems Modeling : Methods and Best Practices

By Halpin, T. A.; Krogstie, John.; Proper, Erik.
2008., ()

Subject:
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All