Showing 161 - 180 results of 2,106 for search '"Cipher"', query time: 0.58s Refine Results
  1. 161
  2. 162
    by Shih-Chuan Lu, 盧世權
    Published 2003
    ... the original encryption standard DES. AES is a block cipher system based on simple algebraic operations...
    Get full text
    Others
  3. 163
    ...碩士 === 國立交通大學 === 資訊工程系 === 91 === The theory of the stream cipher has developed quickly...
    Get full text
    Others
  4. 164
    by Li-Hung Chang, 張李鴻
    Published 2006
    ...). Serpent, a symmetric block cipher with block size 128 and variable key length (128,192, or 256), was one...
    Get full text
    Others
  5. 165
    by Jyun-Wei Lyu, 呂俊瑋
    Published 2006
    ... and Biham proposed the concept of dual ciphers in 2002. The emersion of dual ciphers has brought...
    Get full text
    Others
  6. 166
  7. 167
    by McLaughlin, James
    Published 2012
    ..., and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent....
    Get full text
  8. 168
  9. 169
  10. 170
    ...Confusion and Diffusion are two properties of a secure cipher, identified by Claude Shannon...
    Get full text
    Get full text
    Others
  11. 171
    by Seounghwan Oh, Seongjoon Park, Hwangnam Kim
    Published 2020-01-01
    Subjects: ...symmetric key cipher...
    Get full text
    Article
  12. 172
  13. 173
  14. 174
    by Benoît Cogliati, Jooyoung Lee, Yannick Seurin
    Published 2017-06-01
    Subjects: ...tweakable block cipher...
    Get full text
    Article
  15. 175
    by Bordea G., Buja, A.G, Latip, S.F.A
    Published 2015
    Subjects: ...Cipher...
    View Fulltext in Publisher
    View in Scopus
    Article
  16. 176
    Subjects: ...Symmetric ciphers...
    Get full text
    Article
  17. 177
    by Doris Zeilinger
    Published 2021-05-01
    ...The Blochian concept of cipher is discussed in some detail with a view to possible developments...
    Get full text
    Article
  18. 178
    ... in the cryptanalysis of block ciphers, has increased. In this work, the study of certain parameters that intervene...
    Get full text
    Article
  19. 179
  20. 180