Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-6
|
Results: 6
2-KEY TRIPLE ENCRYPTION
Authors:
DAMGARD IB KNUDSEN LR
Citation:
Ib. Damgard et Lr. Knudsen, 2-KEY TRIPLE ENCRYPTION, Journal of cryptology, 11(3), 1998, pp. 209-218
ATTACKS ON FAST DOUBLE BLOCK LENGTH HASH FUNCTIONS
Authors:
KNUDSEN LR LAI XJ PRENEEL B
Citation:
Lr. Knudsen et al., ATTACKS ON FAST DOUBLE BLOCK LENGTH HASH FUNCTIONS, Journal of cryptology, 11(1), 1998, pp. 59-72
MACDES - MAC ALGORITHM-BASED ON DES
Authors:
KNUDSEN LR PRENEEL B
Citation:
Lr. Knudsen et B. Preneel, MACDES - MAC ALGORITHM-BASED ON DES, Electronics Letters, 34(9), 1998, pp. 871-873
DIFFERENTIAL CRYPTANALYSIS OF RC5
Authors:
KNUDSEN LR MEIER W
Citation:
Lr. Knudsen et W. Meier, DIFFERENTIAL CRYPTANALYSIS OF RC5, European transactions on telecommunications, 8(5), 1997, pp. 445-454
CHOSEN-TEXT ATTACK ON CBC-MAC
Authors:
KNUDSEN LR
Citation:
Lr. Knudsen, CHOSEN-TEXT ATTACK ON CBC-MAC, Electronics Letters, 33(1), 1997, pp. 48-49
PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK
Authors:
NYBERG K KNUDSEN LR
Citation:
K. Nyberg et Lr. Knudsen, PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK, Journal of cryptology, 8(1), 1995, pp. 27-37
Risultati:
1-6
|