Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Cryptage")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3592

  • Page / 144
Export

Selection :

  • and

An easy adapted image chaotic cipher to AWGN canal transmissionKHALFALLAH, Ali; MBAYA, Naim; BOUHLEL MOHAMED SALIM et al.RIST. 2007, Vol 17, Num 1, issn 1111-0015, 7, 153-170 [19 p.]Article

Reversible cellular automata based encryptionSEREDYNSKI, Marcin; PIENKOSZ, Krzysztof; BOUVRY, Pascal et al.Lecture notes in computer science. 2004, pp 411-418, issn 0302-9743, isbn 3-540-23388-1, 8 p.Conference Paper

Cryptanalysis of the augmented family of cryptographic parity circuits proposed at ISW'97YOUSSEF, A. M.Lecture notes in computer science. 2001, pp 29-38, issn 0302-9743, isbn 3-540-42069-XConference Paper

Cryptanalysis of the EMD mode of operationJOUX, Antoine.Lecture notes in computer science. 2003, pp 1-16, issn 0302-9743, isbn 3-540-14039-5, 16 p.Conference Paper

An introduction to block cipher cryptanalysisDE CANNIERE, Christophe; BIRYUKOV, Alex; PRENEEL, Bart et al.Proceedings of the IEEE. 2006, Vol 94, Num 2, pp 346-356, issn 0018-9219, 11 p.Article

Introducing secure modes of operation for optical encryptionNAUGHTON, Thomas J; HENNELLY, Bryan M; DOWLING, Tom et al.Journal of the Optical Society of America. A, Optics, image science, and vision (Print). 2008, Vol 25, Num 10, pp 2608-2617, issn 1084-7529, 10 p.Article

Symmetric block ciphers based on group basesCANDA, Valér; VAN TRUNG, Tran; MAGLIVERAS, Spyros et al.Lecture notes in computer science. 2001, pp 89-105, issn 0302-9743, isbn 3-540-42069-XConference Paper

SAC 2002 : selected areas in cryptography (St John's, 15-16 August 2002, revised papers)Nyberg, Kaisa; Heys, Howard.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-00622-2, XI, 404 p, isbn 3-540-00622-2Conference Proceedings

TRIVIUM : A Stream Cipher Construction Inspired by Block Cipher Design PrinciplesDE CANNIERE, Christophe.Lecture notes in computer science. 2006, pp 171-186, issn 0302-9743, isbn 3-540-38341-7, 1Vol, 16 p.Conference Paper

New applications of time memory data tradeoffsJIN HONG; SARKAR, Palash.Lecture notes in computer science. 2005, pp 353-372, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

Cryptographic applications of T-functionsKLIMOV, Alexander; SHAMIR, Adi.Lecture notes in computer science. 2004, pp 248-261, issn 0302-9743, isbn 3-540-21370-8, 14 p.Conference Paper

Visible encryption: Using paper as a secure channelDEGARA-QUINTELA, Norberto; PEREZ-GONZALEZ, Fernando.SPIE proceedings series. 2003, pp 413-422, isbn 0-8194-4820-6, 10 p.Conference Paper

Side-channel attacks on textbook RSA and ElGamal encryptionKÜHN, Ulrich.Lecture notes in computer science. 2002, pp 324-336, issn 0302-9743, isbn 3-540-00324-X, 13 p.Conference Paper

Turing: A fast stream cipherROSE, Gregory G; HAWKES, Philip.Lecture notes in computer science. 2003, pp 290-306, issn 0302-9743, isbn 3-540-20449-0, 17 p.Conference Paper

OAEP reconsideredSHOUP, Victor.Journal of cryptology. 2002, Vol 15, Num 4, pp 223-249, issn 0933-2790, 27 p.Article

Modes of operation of stream ciphersGOLIC, Jovan Dj.Lecture notes in computer science. 2001, pp 233-247, issn 0302-9743, isbn 3-540-42069-XConference Paper

Structural cryptanalysis of SASASBIRYUKOV, Alex; SHAMIR, Adi.Lecture notes in computer science. 2001, pp 394-405, issn 0302-9743, isbn 3-540-42070-3Conference Paper

A systematic evaluation of compact hardware implementations for the Rijndael S-boxMENTENS, Nele; BATINA, Lejla; PRENEEL, Bart et al.Lecture notes in computer science. 2005, pp 323-333, issn 0302-9743, isbn 3-540-24399-2, 11 p.Conference Paper

A new cryptanalytic time-memory trade-off for stream ciphersERGULER, Imran; ANARIM, Emin.Lecture notes in computer science. 2005, pp 215-223, issn 0302-9743, isbn 3-540-29414-7, 1Vol, 9 p.Conference Paper

Hyper-bent functionsYOUSSEF, Amr M; GUANG GONG.Lecture notes in computer science. 2001, pp 406-419, issn 0302-9743, isbn 3-540-42070-3Conference Paper

Practical symmetric on-line encryptionFOUQUE, Pierre-Alain; MARTINET, Gwenaëlle; POUPARD, Guillaume et al.Lecture notes in computer science. 2003, pp 362-375, issn 0302-9743, isbn 3-540-20449-0, 14 p.Conference Paper

DFCv2GRANBOULAN, Louis; NGUYEN, Phong Q; NOILHAN, Fabrice et al.Lecture notes in computer science. 2001, pp 57-71, issn 0302-9743, isbn 3-540-42069-XConference Paper

Efficient authenticated encryption schemes with public verifiabilityGUILIN WANG; FENG BAO; CHANGSHE MA et al.IEEE Vehicular Technology Conference. 2004, pp 3258-3261, isbn 0-7803-8521-7, 4 p.Conference Paper

Authenticated Encryption: Toward Next-Generation AlgorithmsMAIMUT, Diana; REYHANITABAR, Reza.IEEE security & privacy. 2014, Vol 12, Num 2, pp 70-72, issn 1540-7993, 3 p.Article

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

  • Page / 144