Handbook of Applied Cryptography (1997)

Cached

Download Links

by Alfred J. Menezes , Paul C. Van Oorschot , Scott A. Vanstone , R. L. Rivest
Citations:2447 - 30 self

Active Bibliography

Handbook of Applied Cryptography - References – A. Menezes, P van Oorschot, S. Vanstone, M. Abadi, R. Needham, Prudent Engineering
This is a Chapter from the Handbook of Applied Cryptography – A. Menezes, P. van Oorschot, S. Vanstone - 1996
This is a Chapter from the – Handbook Of Applied
3 Design principles for dedicated hash functions – Bart Preneel - 1994
5 Improved public key cryptosystems secure against chosen ciphertext attacks – Yuliang Zheng - 1994
4 PRNGlib: A Parallel Random Number Generator Library – Norio Masuda, Frank Zimmermann - 1996
RANEXP: Experimental Random Number Generator Package – Michael Hennecke Rechenzentrum, Michael Hennecke - 1994
Primitive and Almost Primitive Trinomials – Richard P. Brent - 2002
Primitive Trinomials and Random Number Generators – Richard P. Brent - 2001
9 A fast algorithm for testing irreducibility of trinomials mod 2 – Richard P. Brent, Samuli Larvala, Paul Zimmermann - 2000
26 Uniform Random Number Generators for Supercomputers – Richard P. Brent - 1992
8 Uniform Random Number Generators for Vector and Parallel Computers – Richard P. Brent - 1992
unknown title – unknown authors - 1991
28 On the Periods of Generalized Fibonacci Recurrences – Richard P. Brent - 1992
10 Stream ciphers – M. J. B. Robshaw - 1995
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers – Haina Zhang Shaohui, Haina Zhang, Shaohui Wang, Xiaoyun Wang - 2006
A3 W CMOS True Random Number Generator With Adaptive Floating-Gate Offset Cancellation – Jeremy Holleman, Student Member, Seth Bridges, Brian P. Otis, Chris Diorio
1 Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ – Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
Quelques applications de . . . – Shaoshi Chen - 2011