alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 4 Results, Digital:4, Print: 0

Showing Page No. 1 , Digital:4, Print: 0

An attack on the last two rounds of MD4

By den Boer, B.
101., ()

Subject: Advances in Cryptology - Crypto '91; Lecture Notes in Computer Science Volume 576; MD4 hash function
Availability: 1 of 1(eBook)
Read More

Collisions for the compression function of MD-5

By den Boer, B.
101., ()

Subject: Advances in Cryptology - EuroCrypt '93; Lecture Notes in Computer Science Volume 765; MD4 hash function
Availability: 1 of 1(eBook)
Read More

Cryptanalysis of F.E.A.L.

By den Boer, B.
101., ()

Subject: Advances in Cryptology - EuroCrypt '88; Lecture Notes in Computer Science Volume 330; FEAL
Availability: 1 of 1(eBook)
Read More

Efficient offline electronic checks (extended abstract)

By Chaum, D., den Boer, B., van Heyst, E., Mjoelsnes, S. F.
101., ()

Subject: Advances in Cryptology - EuroCrypt '89; Lecture Notes in Computer Science Volume 434; payment systems; cut and choose; electronic cash
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All