-
1
-
-
34848840425
-
Simple and effective key scheduling for symmetric ciphers
-
C. M. Adams. Simple and effective key scheduling for symmetric ciphers. Proc. Of SAC'94, 1994.
-
(1994)
Proc. Of SAC'94
-
-
Adams, C.M.1
-
2
-
-
34848891649
-
Differential Cryptanalysis of the Data Encryption Standard
-
NC
-
E. Bihan and Shanir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, Erewhon, NC, 1993.
-
(1993)
Springer-Verlag, Erewhon
-
-
Bihan, E.1
Shanir2
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-427, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-427
-
-
Elgamal, T.1
-
5
-
-
34848826372
-
-
C. B. et al. Mars - a candidate cipher for aes. First Advanced Encryption Standard (AES) Conference, 1998.
-
C. B. et al. Mars - a candidate cipher for aes. First Advanced Encryption Standard (AES) Conference, 1998.
-
-
-
-
8
-
-
0037195738
-
Cryptography based on neural networks - analytical results
-
I. K. Michael Rosen-Zvi and W. Kinzel. Cryptography based on neural networks - analytical results. J. Phys. A, 47(35):707-713, 2002.
-
(2002)
J. Phys. A
, vol.47
, Issue.35
, pp. 707-713
-
-
Michael Rosen-Zvi, I.K.1
Kinzel, W.2
-
9
-
-
34848862272
-
-
N. B. of Standards. Data encryption standard. U.S. Department of Commerce, (pub. 46), January 1977.
-
N. B. of Standards. Data encryption standard. U.S. Department of Commerce, (pub. 46), January 1977.
-
-
-
-
11
-
-
0142120725
-
Public channel cryptography by synchronization of neural networks and chaotic maps
-
I. K. Rachel Mislovaty, Einat Klein and W. Kinzel. Public channel cryptography by synchronization of neural networks and chaotic maps. Phys. Rev. Lett., 11(91):118701, 2003.
-
(2003)
Phys. Rev. Lett
, vol.11
, Issue.91
, pp. 118701
-
-
Rachel Mislovaty, I.K.1
Klein, E.2
Kinzel, W.3
-
15
-
-
0019080452
-
A modification of the rsa public-key encryption procedure
-
January
-
H. Williams. A modification of the rsa public-key encryption procedure. IEEE Transactions on Information Theory, 26(6):726-729, January 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.1
-
16
-
-
0036082851
-
Application of multilayer perceptron networks in public key cryptography
-
2Honolulu, HI, USA, May
-
L. P. Yee and L. C. D. Silva. Application of multilayer perceptron networks in public key cryptography. Proceedings of IJCNN 02, 2(Honolulu, HI, USA): 1439-1443, May 2002.
-
(2002)
Proceedings of IJCNN 02
, pp. 1439-1443
-
-
Yee, L.P.1
Silva, L.C.D.2
|