Gotowa bibliografia na temat „Symmetric ciphers”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Symmetric ciphers”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Symmetric ciphers"
Lysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii i Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution". Radioelectronic and Computer Systems, nr 3 (29.09.2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Pełny tekst źródłaJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim i Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers". Applied Sciences 11, nr 11 (23.05.2021): 4776. http://dx.doi.org/10.3390/app11114776.
Pełny tekst źródłaZhang, Ping. "Quantum Related-Key Attack Based on Simon’s Algorithm and Its Applications". Symmetry 15, nr 5 (24.04.2023): 972. http://dx.doi.org/10.3390/sym15050972.
Pełny tekst źródłaKaidalov, Dmytro, Roman Oliynykov i Oleksandr Kazymyrov. "A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks". Tatra Mountains Mathematical Publications 60, nr 1 (1.09.2014): 25–45. http://dx.doi.org/10.2478/tmmp-2014-0023.
Pełny tekst źródłaJang, Kyoungbae, Seungju Choi, Hyeokdong Kwon, Hyunji Kim, Jaehoon Park i Hwajeong Seo. "Grover on Korean Block Ciphers". Applied Sciences 10, nr 18 (14.09.2020): 6407. http://dx.doi.org/10.3390/app10186407.
Pełny tekst źródłaAhmed, Fatma, i Dalia H. Elkamchouchi. "A New Modified MARS Cryptosystem Based on Niho Exponent with an Enhanced S-Box Generation". Electronics 11, nr 15 (26.07.2022): 2318. http://dx.doi.org/10.3390/electronics11152318.
Pełny tekst źródłaFaraoun, Kamel Mohammed. "On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction". Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 15, nr 1 (1.01.2015): 21. http://dx.doi.org/10.17951/ai.2015.15.1.21-31.
Pełny tekst źródłaSaraiva, Daniel A. F., Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González i Paul Crocker. "PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices". Sensors 19, nr 19 (5.10.2019): 4312. http://dx.doi.org/10.3390/s19194312.
Pełny tekst źródłaHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish". Data Science: Journal of Computing and Applied Informatics 4, nr 2 (31.07.2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Pełny tekst źródłaKuznetsov, A. A., V. O. Frolenko, E. S. Eremin i D. V. Ivanenko. "Investigation of cross-platform realizations of stream symmetric ciphers". Radiotekhnika, nr 193 (15.05.2018): 94–106. http://dx.doi.org/10.30837/rt.2018.2.193.10.
Pełny tekst źródłaRozprawy doktorskie na temat "Symmetric ciphers"
Gustafson, Helen May. "Statistical analysis of symmetric ciphers". Thesis, Queensland University of Technology, 1996.
Znajdź pełny tekst źródłaPenna, Lyta. "Implementation issues in symmetric ciphers". Thesis, Queensland University of Technology, 2002.
Znajdź pełny tekst źródłaMirza, Fauzan ul-Haque. "Analysis of some modern symmetric ciphers". Thesis, Royal Holloway, University of London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271702.
Pełny tekst źródłaDawson, Edward Pyle. "Design and cryptanalysis of symmetric ciphers". Thesis, Queensland University of Technology, 1991.
Znajdź pełny tekst źródłaHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers". Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16055/1/Matt_Henricksen_Thesis.pdf.
Pełny tekst źródłaHenricksen, Matthew. "Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers". Queensland University of Technology, 2005. http://eprints.qut.edu.au/16055/.
Pełny tekst źródłaČanda, Valér. "Scalable symmetric block ciphers based on group bases". [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=962789755.
Pełny tekst źródłaSaran, Nurdan A. "Time Memory Trade Off Attack On Symmetric Ciphers". Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610437/index.pdf.
Pełny tekst źródłaDistinguished Point Method and Rainbow Method. Finally, we discuss the adjustment of the parameters to achieve a high success rate. To support our theoretical framework, we also present empirical results of our analysis to actual ciphers.
May, Lauren Jeanette. "Design, analysis and implementation of symmetric block ciphers". Thesis, Queensland University of Technology, 2002.
Znajdź pełny tekst źródłaMcKague, Matthew. "Design and Analysis of RC4-like Stream Ciphers". Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1141.
Pełny tekst źródłaKsiążki na temat "Symmetric ciphers"
The seventh and the first: The divine thread of the Torah. Jerusalem: Urim Publications, 2012.
Znajdź pełny tekst źródłaMartin, Keith M. Symmetric Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0004.
Pełny tekst źródłaCzęści książek na temat "Symmetric ciphers"
Manz, Olaf. "Symmetric Ciphers". W Encrypt, Sign, Attack, 19–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-66015-7_2.
Pełny tekst źródłaMileva, Aleksandra, Vesna Dimitrova, Orhun Kara i Miodrag J. Mihaljević. "Catalog and Illustrative Examples of Lightweight Cryptographic Primitives". W Security of Ubiquitous Computing Systems, 21–47. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_2.
Pełny tekst źródłaGebotys, Catherine H. "Symmetric Key Protocols Including Ciphers". W Security in Embedded Devices, 111–42. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-1530-6_6.
Pełny tekst źródłaSarkar, Palash. "Generic Attacks on Symmetric Ciphers". W Information Security and Cryptology – ICISC 2006, 7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11927587_2.
Pełny tekst źródłaSchmidt, Jörn-Marc, i Marcel Medwed. "Countermeasures for Symmetric Key Ciphers". W Information Security and Cryptography, 73–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29656-7_5.
Pełny tekst źródłaKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko i Natalia Kryvinska. "Stream Symmetric Cipher “Strumok”". W Stream Ciphers in Modern Real-time IT Systems, 467–516. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_16.
Pełny tekst źródłaBuell, Duncan. "Modern Symmetric Ciphers—DES and AES". W Undergraduate Topics in Computer Science, 123–47. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73492-3_9.
Pełny tekst źródłaČanda, Valér, Tran van Trung, Spyros Magliveras i Tamás Horváth. "Symmetric Block Ciphers Based on Group Bases". W Selected Areas in Cryptography, 89–105. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44983-3_7.
Pełny tekst źródłaKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko i Natalia Kryvinska. "Analysis of Stream Modes for Block Symmetric Ciphers". W Stream Ciphers in Modern Real-time IT Systems, 65–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_5.
Pełny tekst źródłaKuznetsov, Alexandr Alexandrovich, Oleksandr Volodymyrovych Potii, Nikolay Alexandrovich Poluyanenko, Yurii Ivanovich Gorbenko i Natalia Kryvinska. "Comparison of Stream Modes in Block Symmetric Ciphers". W Stream Ciphers in Modern Real-time IT Systems, 99–110. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79770-6_6.
Pełny tekst źródłaStreszczenia konferencji na temat "Symmetric ciphers"
Digulescu, Mircea-Adrian. "Applications of SKREM-Like Symmetric Key Ciphers". W 10th International Conference on Information Technology Convergence and Services (ITCSE 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110912.
Pełny tekst źródłaLisickiy, Konstantin, Iryna Lisickaya, Victor Dolgov i Kateryna Kuznetsova. "Random S-boxes in Symmetric Ciphers". W 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON). IEEE, 2019. http://dx.doi.org/10.1109/ukrcon.2019.8879986.
Pełny tekst źródłaKuznetsov, Alexandr, Inna Horkovenko, Olena Maliy, Nikita Goncharov, Tetiana Kuznetsova i Nikolaj Kovalenko. "Non-Binary Cryptographic Functions for Symmetric Ciphers". W 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2020. http://dx.doi.org/10.1109/picst51311.2020.9467982.
Pełny tekst źródłaNishikawa, Naoki, Keisuke Iwai i Takakazu Kurokawa. "High-Performance Symmetric Block Ciphers on CUDA". W 2011 Second International Conference on Networking and Computing (ICNC). IEEE, 2011. http://dx.doi.org/10.1109/icnc.2011.40.
Pełny tekst źródłaCool, D. L., i A. D. Keromytis. "Conversion and proxy functions for symmetric key ciphers". W International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II. IEEE, 2005. http://dx.doi.org/10.1109/itcc.2005.115.
Pełny tekst źródłaKuznetsov, Olexandr, Yuriy Gorbenko i Ievgeniia Kolovanova. "Combinatorial properties of block symmetric ciphers key schedule". W 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T). IEEE, 2016. http://dx.doi.org/10.1109/infocommst.2016.7905334.
Pełny tekst źródłaGorbenko, Ivan, Alexandr Kuznetsov, Vladyslav Tymchenko, Yurii Gorbenko i Olena Kachko. "Experimental Studies Of The Modern Symmetric Stream Ciphers". W 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2018. http://dx.doi.org/10.1109/infocommst.2018.8632058.
Pełny tekst źródłaNariezhnii, Oleksii, Egor Eremin, Vladislav Frolenko, Kyrylo Chernov, Tetiana Kuznetsova i Iryna Chepurko. "Research of Statistical Properties of Stream Symmetric Ciphers". W 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). IEEE, 2018. http://dx.doi.org/10.1109/infocommst.2018.8632138.
Pełny tekst źródłaKuznetsov, Alexandr, Vladislav Frolenko, Egor Eremin i Olga Zavgorodnia. "Research of cross-platform stream symmetric ciphers implementation". W 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). IEEE, 2018. http://dx.doi.org/10.1109/dessert.2018.8409148.
Pełny tekst źródłaJasim, Khalid Fadhil, i Imad Fakhri Al Shaikhli. "Comparative study of some symmetric ciphers in mobile systems". W 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M). IEEE, 2014. http://dx.doi.org/10.1109/ict4m.2014.7020587.
Pełny tekst źródłaRaporty organizacyjne na temat "Symmetric ciphers"
Blaze, Matt, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier i Tsutomu Shimomura. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Fort Belvoir, VA: Defense Technical Information Center, marzec 1996. http://dx.doi.org/10.21236/ada385264.
Pełny tekst źródła