Fast Software Encryption Functions (1998)

Cached

Download Links

by Ralph C. Merkle
Citations:39 - 0 self

Active Bibliography

Heterogeneous Chemistry of HO2NO2 on Liquid Sulfuric Acid – Renyi Zhang, Km F. Keyser - 1995
CONSTRUCTIVIST COMPUTER SCIENCE EDUCATION RECONSTRUCTED – Meurig Beynon
Developing Academic Information Literacy For Undergraduates – Editorial Alan Poulter - 2009
Non-Abelian Vortices without Dynamical – Daniele Dorigoni, Kenichi Konishi, Keisuke Ohashi - 801
3 On the Effect of Floorplanning on the Yield of Large Area Integrated Circuits – Zahava Koren, Israel Koren - 1997
46 Defect tolerance in VLSI circuits: Techniques and yield analysis – Israel Koren, Zahava Koren - 1998
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
Probabilistic Linearities In Des – Paul Voois, Philip S. Bednarz, Martin E. Hellman
On Weaknesses of Non-surjective Round Functions (Extended Abstract) – Vincent Rijmen, Bart Preneel - 1995
Multicast Security and Its Extension to a Mobile Environment – Li Gong And, Li Gong, Nachum Shacham - 1995
A Case Study of Partially Evaluated Hardware Circuits: Key-Specific DES – Jason Leonard And, Jason Leonard, William H. Mangione-smith - 1997
3 Chinks in the Armor of Public Key Cryptosystems – William Wilson - 1994
1 Using Content-Addressable Search Engines To Encrypt and Break DES – Peter C. Wayner - 1993
1 Security Amplication by Composition: The case of Doubly-Iterated, Ideal Ciphers – W. Aiello, M. Bellare G. Di Crescenzo, M. Bellare, G. Di, Crescenzo R. Venkatesan
1 Reconfigurable Cryptography: A Hardware Compiler for Cryptographic Applications – C. Scott Ananian - 1997
How to Protect DES Against Exhaustive Key Search (An Analysis of DESX) – Joe Kiliany, Phillip Rogawayz - 2000
ABSTRACT TABLES – Mark Steven Stamp - 1992
Probable plaintext cryptanalysis of . . . – Steven M. Bellovin - 1997
Codes -- The Guide to Secrecy . . . – Richard A. Mollin