Found: 22
Select item for more details and to access through your institution.
Cryptanalysis of Loiss Stream Cipher-Revisited.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/457275
- By:
- Publication type:
- Article
Improved linear cryptanalysis on 25‐round SMS4.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 14, p. 1643, doi. 10.1049/cmu2.12365
- By:
- Publication type:
- Article
Practical Security Evaluation against Differential and Linear Cryptanalyses for the Lai-Massey Scheme with an SPS F-function.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 10, p. 3624, doi. 10.3837/tiis.2014.10.020
- By:
- Publication type:
- Article
Potassium Permanganate and Sodium Silicate Co-modified Bamboo Charcoal for Efficient Treatment of Ammonia Nitrogen Pollution in Rare Earth Mines: Performance and Mechanism.
- Published in:
- Water, Air & Soil Pollution, 2023, v. 234, n. 2, p. 1, doi. 10.1007/s11270-022-06020-x
- By:
- Publication type:
- Article
Intervention on Externalizing Problems of Undercontrolled Personality Types in Primary School Students.
- Published in:
- Frontiers in Psychology, 2020, v. 11, p. 1, doi. 10.3389/fpsyg.2020.01233
- By:
- Publication type:
- Article
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7429320
- By:
- Publication type:
- Article
Cryptanalysis on Three Kinds of Generalized Feistel Structures with Secret Round Functions.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2019, v. 44, n. 4, p. 3381, doi. 10.1007/s13369-018-3530-6
- By:
- Publication type:
- Article
Impact of Refractive Status on Presbyopia Progression among Patients with Presbyopia.
- Published in:
- Graefe's Archive of Clinical & Experimental Ophthalmology, 2024, v. 262, n. 8, p. 2695, doi. 10.1007/s00417-024-06455-4
- By:
- Publication type:
- Article
A second preimage attack on zipper hash.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2860, doi. 10.1002/sec.1210
- By:
- Publication type:
- Article
Multiset Structural Attack on Generalized Feistel Networks.
- Published in:
- Mathematical Problems in Engineering, 2019, p. 1, doi. 10.1155/2019/2390462
- By:
- Publication type:
- Article
Impossible Differential Cryptanalysis on Lai-Massey Scheme.
- Published in:
- ETRI Journal, 2014, v. 36, n. 6, p. 1032, doi. 10.4218/etrij.14.0113.1335
- By:
- Publication type:
- Article
Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search.
- Published in:
- Computer Journal, 2023, v. 66, n. 5, p. 1268, doi. 10.1093/comjnl/bxac012
- By:
- Publication type:
- Article
An Improvement of the CS Attack to DSC Cipher.
- Published in:
- Computer Journal, 2019, v. 62, n. 8, p. 1158, doi. 10.1093/comjnl/bxz037
- By:
- Publication type:
- Article
A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure.
- Published in:
- Computer Journal, 2019, v. 62, n. 8, p. 1121, doi. 10.1093/comjnl/bxz006
- By:
- Publication type:
- Article
Improved Integral Distinguishers on Compression Function of GOST R Hash Function.
- Published in:
- Computer Journal, 2019, v. 62, n. 4, p. 535, doi. 10.1093/comjnl/bxy123
- By:
- Publication type:
- Article
Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.
- Published in:
- Computer Journal, 2018, v. 61, n. 8, p. 1158, doi. 10.1093/comjnl/bxy045
- By:
- Publication type:
- Article
Multiple Impossible Differential Attacks for ForkAES.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5360032
- By:
- Publication type:
- Article
Meet-in-the-Middle Attack on 11-Round 3D Block Cipher.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 1, p. 19, doi. 10.1142/S0129054117500022
- By:
- Publication type:
- Article
Vanadium: A Review of Different Extraction Methods to Evaluate Bioavailability and Speciation.
- Published in:
- Minerals (2075-163X), 2022, v. 12, n. 5, p. 642, doi. 10.3390/min12050642
- By:
- Publication type:
- Article
Cryptanalysis of WG Family of Stream Ciphers.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2677, doi. 10.1093/comjnl/bxv024
- By:
- Publication type:
- Article
Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 904, doi. 10.1093/comjnl/bxu010
- By:
- Publication type:
- Article
Changes in Weather Systems during Anomalously Wet and Dry Years in Southeastern Australia.
- Published in:
- Journal of Climate, 2024, v. 37, n. 4, p. 1131, doi. 10.1175/JCLI-D-23-0305.1
- By:
- Publication type:
- Article