-
1
-
-
19144369108
-
Programming satan's computer
-
Computer Science Today - Recent Trends and Developments, Springer-Verlag
-
R. Anderson & R. Needham. Programming satan's computer. In Computer Science Today - Recent Trends and Developments, LNCS 1000, pp. 426-440. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
2
-
-
0020151766
-
ON THE CRYPTANALYSIS OF ROTOR MACHINES AND SUBSTITUTION - PERMUTATION NETWORKS.
-
D. Andleman & J. Reeds. On the cryptanalysis of rotor machines and substitution-permutations networks. IEEE Trans, on Inf. Theory, 28(4):578-584, 1982. (Pubitemid 12525109)
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.4
, pp. 578-584
-
-
Andelman, D.1
Reeds, J.2
-
4
-
-
0031365466
-
Using CSP look-back techniques to solve real-world SAT instances
-
AAAI Press/The MIT Press
-
R. Bayardo & R. Schrag. Using CSP look-back techniques to solve real-world SAT instances, in Proc. ofAAAI-97. pp. 203-208. AAAI Press/The MIT Press, 1997.
-
(1997)
Proc. of AAAI-97
, pp. 203-208
-
-
Bayardo, R.1
Schrag, R.2
-
5
-
-
0026397734
-
Differential cryptanalisis of DES-like cryptosystems
-
E. Biham & A. Shamir. Differential cryptanalisis of DES-like cryptosystems. J of Crvptology 4(1): 3-72, 1991.
-
(1991)
J of Crvptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
0022769976
-
GRAPH-BASED ALGORITHMS FOR BOOLEAN FUNCTION MANIPULATION.
-
R. Bryant. Graph-based algorithms for boolean function manipulation. IEEE TOC, 35(8):677-691, 1986. (Pubitemid 16629996)
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
7
-
-
0030108241
-
Experimental results on the crossover point in random 3SAT
-
J. Crawford &. L. Auton. Experimental results on the crossover point in random 3SAT. ALL 81(L2):31-57, 1996.
-
(1996)
ALL
, vol.81
, Issue.L2
, pp. 31-57
-
-
Crawford, J.1
Auton, L.2
-
8
-
-
0004356882
-
Finding hard instances of the satisfiability problem: A survey
-
Satisfiability Problem: Theory and Applications, AMS
-
S. Cook & D. Mitchel. Finding hard instances of the satisfiability problem: A survey. In Satisfiability Problem: Theory and Applications, DIMACS Series in Discr. Math. and TCS, 25:1-17. AMS, 1997.
-
(1997)
DIMACS Series in Discr. Math. And TCS
, vol.25
, pp. 1-17
-
-
Cook, S.1
Mitchel, D.2
-
9
-
-
0343978362
-
-
Technical report, Cryptography Research Inc., Available on the web at
-
DES key search project information. Technical report, Cryptography Research Inc., 1998. Available on the web at http://www.cryptography.com/des/.
-
(1998)
DES Key Search Project Information
-
-
-
10
-
-
0016579870
-
Some cryptographic techniques for machine-to-machine data communication
-
H. Feistel, W. Notz, and L. Smith. Some cryptographic techniques for machine-to-machine data communication. Proc. of the IEEE, 63(11): 1545 1554, 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.11
, pp. 15451554
-
-
Feistel, H.1
Notz, W.2
Smith, L.3
-
11
-
-
0004287270
-
-
Committee on Payment, Settelment Systems, and the Group of Computer Experts of the Central Banks of the Group of Ten countries. Bank for International Settlements, Basle, August
-
Committee on Payment, Settelment Systems, and the Group of Computer Experts of the Central Banks of the Group of Ten countries. Security of Electronic Money. Bank for International Settlements, Basle, August 1996.
-
(1996)
Security of Electronic Money
-
-
-
14
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
Proc. of CRYPTO-94, Springer Vei lag
-
M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Proc. of CRYPTO-94, LNCS 839, pp. 1-11." Springer Vei lag, 1994.
-
(1994)
LNCS
, vol.839
, pp. 1-11
-
-
Matsui, M.1
-
15
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Proc. of Eurocrypt 93. Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for des cipher. In Proc. of Eurocrypt 93. LNCS 765, pp. 368 397. Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.765
, pp. 368397
-
-
Matsui, M.1
-
16
-
-
34248682000
-
Data encryption standard
-
NIST. National (U.S.) Bureau of Standards, Dec 1997. Supersedes FIPS PUB 46-1 of Jan. 1988 and FIPS PUB 46 of Jan. 1977
-
NIST. Data encryption standard. Federal Information Processing Standards Publications FIPS PUB 46-2, National (U.S.) Bureau of Standards, Dec 1997. Supersedes FIPS PUB 46-1 of Jan. 1988 and FIPS PUB 46 of Jan. 1977.
-
Federal Information Processing Standards Publications FIPS PUB 46-2
-
-
-
17
-
-
84880692868
-
Emerging market economy forum (EMEF): Report of the ministerial workshop on cryptography policy
-
OECD. Paris, Feb
-
OECD. Emerging market economy forum (EMEF): Report of the ministerial workshop on cryptography policy. OLIS SG/EMEF/ICCP(98)L Organization for Economic Co-operation and Development. Paris, Feb 1998.
-
(1998)
OLIS SG/EMEF/ICCP(98)L Organization for Economic Co-operation and Development
-
-
-
18
-
-
0002219322
-
An attack on a recurive authentication protocol: A cautionary tale
-
P. Ryan & S. Schneider. An attack on a recurive authentication protocol: a cautionary tale. I PL, 65(15):7-16, 1998.
-
(1998)
I PL
, vol.65
, Issue.15
, pp. 7-16
-
-
Ryan, P.1
Schneider, S.2
-
20
-
-
0028574681
-
Noise strategies for local search
-
AAAI Press/The MIT Press
-
B. Selman, H. Kautz, and B. Cohen. Noise strategies for local search. In Proc. of AAA I-94, pp. 337-343. AAAI Press/The MIT Press, 1994.
-
(1994)
Proc. of AAA I-94
, pp. 337-343
-
-
Selman, B.1
Kautz, H.2
Cohen, B.3
-
21
-
-
0002186293
-
Ten challenges in propositional resoning and search
-
Morgan Kaufmann
-
B. Selman, H. Kautz, and D. McAllester. Ten challenges in propositional resoning and search. In Proc. UCAI-97, pp. n50 54. Morgan Kaufmann, 1997.
-
(1997)
Proc. UCAI-97
-
-
Selman, B.1
Kautz, H.2
McAllester, D.3
|