Results 241 to 249 of about 23,331 (249)
Some of the next articles are maybe not open access.

On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function

Lecture Notes in Electrical Engineering, 2017
Edward Dawson
exaly  

Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials

IEEE Transactions on Information Theory, 2010
Qichun Wang, Haibin Kan, Xiangyang Xue
exaly  

Cryptographic Primitives and Optimization

Oleksandr Kuznetsov   +4 more
openaire   +1 more source

Truncator: Time-Space Tradeoff of Cryptographic Primitives

Foteini Baldimtsi   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy