Results 271 to 280 of about 78,722 (281)
Some of the next articles are maybe not open access.
Conditionally-perfect secrecy and a provably-secure randomized cipher
Journal of Cryptology, 1992exaly
A real-time inversion attack on the GMR-2 cipher used in the satellite phones
Science China Information Sciences, 2018exaly
Design and statistical analysis of a new chaotic block cipher for Wireless Sensor Networks
Communications in Nonlinear Science and Numerical Simulation, 2012exaly

