Results 241 to 249 of about 23,331 (249)
Some of the next articles are maybe not open access.
On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
Lecture Notes in Electrical Engineering, 2017Edward Dawson
exaly
Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials
IEEE Transactions on Information Theory, 2010Qichun Wang, Haibin Kan, Xiangyang Xue
exaly
Secure and Computationally Efficient Cryptographic Primitive Based on Cellular Automaton
Complex Systems, 2019exaly
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
Lecture Notes in Computer Science, 2010exaly
Truncator: Time-Space Tradeoff of Cryptographic Primitives
Foteini Baldimtsi +3 moreopenaire +2 more sources

