AAAAAA

   
Results: 1-6 |
Results: 6

Authors: DAMGARD IB KNUDSEN LR
Citation: Ib. Damgard et Lr. Knudsen, 2-KEY TRIPLE ENCRYPTION, Journal of cryptology, 11(3), 1998, pp. 209-218

Authors: KNUDSEN LR LAI XJ PRENEEL B
Citation: Lr. Knudsen et al., ATTACKS ON FAST DOUBLE BLOCK LENGTH HASH FUNCTIONS, Journal of cryptology, 11(1), 1998, pp. 59-72

Authors: KNUDSEN LR PRENEEL B
Citation: Lr. Knudsen et B. Preneel, MACDES - MAC ALGORITHM-BASED ON DES, Electronics Letters, 34(9), 1998, pp. 871-873

Authors: KNUDSEN LR MEIER W
Citation: Lr. Knudsen et W. Meier, DIFFERENTIAL CRYPTANALYSIS OF RC5, European transactions on telecommunications, 8(5), 1997, pp. 445-454

Authors: KNUDSEN LR
Citation: Lr. Knudsen, CHOSEN-TEXT ATTACK ON CBC-MAC, Electronics Letters, 33(1), 1997, pp. 48-49

Authors: NYBERG K KNUDSEN LR
Citation: K. Nyberg et Lr. Knudsen, PROVABLE SECURITY AGAINST A DIFFERENTIAL ATTACK, Journal of cryptology, 8(1), 1995, pp. 27-37
Risultati: 1-6 |