Showing 41 - 60 results of 98 for search '"Byte', query time: 0.10s Refine Results
  1. 41
    Published 2014
    Table of Contents: “… for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grφstl -- Practical…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 42
    Table of Contents: “… Information Ltd. BioByte. CambridgeSoft. CAS/Scifinder. ChemAxon. Chemical Computing Group Inc. ChemInnovation…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 43
    Published 2010
    Table of Contents: “… of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 44
    Published 2020
    “… forward in byte-addressable capacity compared with current DRAM offerings. This revolutionary new…”
    Get full text
  5. 45
    Published 2002
    Table of Contents: “… as Is: Pattern Matching over Compressed Texts, Multi-byte Character Texts, and Semi-structured Texts -- Pattern…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 46
    Published 1998
    Table of Contents: “… Parity Circuits -- A new byte-oriented block cipher -- Practice-oriented provable-security -- A framework…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 47
    Published 2005
    Table of Contents: “…String Processing and Information Retrieval 2005 -- Enhanced Byte Codes with Restricted Prefix…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 48
  9. 49
    Published 2014
    Table of Contents: “… Desktop Computer -- Stream ciphers and authenticated encryption How to Recover Any Byte of Plaintext on RC…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 50
    Published 2002
    Table of Contents: “… Byte Code Using Formal Methods -- Deriving Cryptographically Sound Implementations Using Composition…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 51
    Published 2005
    Table of Contents: “… Digitalization of Korean Historical Archives -- On Bit-Parallel Processing of Multi-byte Text -- Mobile…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 52
  13. 53
    Published 2018
    Full Text via HEAL-Link
    Electronic eBook
  14. 54
    Published 2009
    Table of Contents: “…-Line Signatures -- Collisions for Hash Functions -- Speeding up Collision Search for Byte-Oriented Hash…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 55
    by Stob, Verity
    Published 2005
    Table of Contents: “… Gnome? -- Let’s Parler Y2K! -- Yocam Hokum -- Bye Bye Byte -- Night Mail -- Cringing for Bobot or How I…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 56
  17. 57
    Published 2010
    Table of Contents: “… -- Security Improvement on a Remote User Authentication Scheme Using Smart Cards -- Dual-Byte-Marker Algorithm…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 58
    Published 2009
    Table of Contents: “… -- Multi-byte Regular Expression Matching with Speculation -- Malware Detection and Prevention (II…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 59
    Published 2008
    Table of Contents: “… -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 60
    Published 2008
    Table of Contents: “… on the Self-Shrinking Generator -- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search