Suchergebnisse
Katalog
Aufsätze & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- block cipher 9 Treffer
- cbc mac 7 Treffer
- modes of operation 6 Treffer
- standards 4 Treffer
- key words 3 Treffer
-
15 weitere Werte:
- message authentication code 3 Treffer
- message authentication codes 3 Treffer
- blockcipher 2 Treffer
- mac 2 Treffer
- mode of operation 2 Treffer
- related-key attack 2 Treffer
- block ciphers 1 Treffer
- cryptography 1 Treffer
- electronic security systems 1 Treffer
- electronic surveillance 1 Treffer
- omac 1 Treffer
- permutations 1 Treffer
- security management 1 Treffer
- security systems 1 Treffer
- tmac 1 Treffer
Verlag
Publikation
- lecture notes in computer science 3 Treffer
- fast software encryption : 10th international workshop, fse 2003, lund, sweden, february 24-26, 2003. revised papers 1 Treffer
- information and communications security - 4th international conference, icics 2002, proceedings 1 Treffer
- information and communications security : 4th international conference, icics 2002 singapore, december 9-12, 2002 proceedings 1 Treffer
- information security & privacy (9783540699712) 1 Treffer
-
6 weitere Werte:
- information security and privacy - 13th australasian conference, acisp 2008, proceedings 1 Treffer
- information security and privacy : 13th australasian conference, acisp 2008, wollongong, australia, july 7-9, 2008. proceedings 1 Treffer
- journal of cryptology 1 Treffer
- journal of cryptology: the journal of the international association for cryptologie research (iacr) 1 Treffer
- progress in cryptology - indocrypt 2003 : 4th international conference on cryptology in india, new delhi, india, december 8-10, 2003. proceedings 1 Treffer
- topics in cryptology - ct-rsa 2003 : the cryptographers' track at the rsa conference 2003 san francisco, ca, usa, april 13-17, 2003 proceedings 1 Treffer
Sprache
Inhaltsanbieter
9 Treffer
-
Dieser Titel kann aus lizenzrechtlichen Gründen nur im Campusnetz oder nach Anmeldung angezeigt werden!BuchZugriff:
-
2008Online E-BookZugriff:
-
2002Online E-BookZugriff:
-
2003Online E-BookZugriff:
-
2003Online E-BookZugriff:
-
In: Journal of Cryptology, Jg. 18 (2005-04-01), Heft 2, S. 111-131Online academicJournalZugriff:
-
In: http://eprint.iacr.org/2002/180.pdf, 2003Online academicJournalZugriff:
-
In: http://eprint.iacr.org/2002/180.ps.gz, 2002academicJournalZugriff:
-
In: http://www.cs.ucdavis.edu/~rogaway/papers/3k.pdf, 2000Online academicJournalZugriff: