Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
conquer algorithm » computer algorithms, control algorithm
cipher algorithm » filter algorithm, faster algorithm
linear algorithm » line algorithms
conquer algorithm » computer algorithms, control algorithm
cipher algorithm » filter algorithm, faster algorithm
linear algorithm » line algorithms
1
“... implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
2
Published 2009
Table of Contents:
“... -- Divide-and-conquer -- Probabilistic analysis and randomized algorithms -- II. Sorting and order...”
Book
3
by Sedgewick, Robert, 1946-
Published 1992
Table of Contents:
“... Sorts. A Linear Sort. 11. Priority Queues. Elementary Implementations. Heap Data Structure. Algorithms...”Published 1992
Book
4
“...Lightweight block cipher algorithms are vital for constrained environment. Substitution box (S-box...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
5
Published 1999
Table of Contents:
“...Algorithm design and analysis techniques / Edward M. Reingold -- Searching / Ricardo Baeza-Yates...”
Book
6
by Smith, Justin R.
Published 1993
Table of Contents:
“... Algorithms. 7.2.2. The Brent Scheduling Principle. 7.2.3. Pipelining. 7.2.4. Divide and Conquer. 7.3. MIMD...”Published 1993
Book
7
by Mahdi, Reyadh H
Published 2009
“...Linear feedback shift register ( LFSR-based) stream cipher an improved design for a random key...”Published 2009
Get full text
Get full text
Get full text
Thesis
8
“...Lightweight block cipher algorithms are important
for constrained environment. LBlock uses word...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
9
by Ariffin, Suriyani
Published 2012
“... of the systems or of data transfers. Symmetric encryption block cipher is an important cryptographic algorithm...”Published 2012
Get full text
Get full text
Thesis
10
Published 2003
Table of Contents:
“...Differential-Linear Cryptanalysis of Serpent /...”
Book
11
Published 1999
Table of Contents:
“...Design of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box...”
Book
12
AAECC-10 : applied algebra, algebraic algorithms, and error-correcting codes : 10th international...
Published 1993
Table of Contents:
“... -- A "divide and conquer" algorithm for Hilbert-Poincare series, multiplicity and dimension of monomial...”
Book
13
“...SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone...”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article
14
Published 1999
Table of Contents:
“...Advanced Encryption Standard -- Improved Analysis of Some Simplified Variants of RC6 -- Linear...”
Book
15
Published 2000
Table of Contents:
“... -- Cryptanalysis of the A5/1 GSM Stream Cipher -- Cryptanalysis II : Block Ciphers -- On Bias Estimation in Linear...”
Book
16
Published 2015
Table of Contents:
“...Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling...”
Book
17
Published 2000
Table of Contents:
“...Cryptanalysis I -- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers -- Cryptanalysis...”
Book
18
Published 2014
Table of Contents:
“... Block Ciphers on x86 Architectures -- A new index calculus algorithm with complexity L(1=4 + o(1...”
Book
19
Published 2014
Table of Contents:
“... for Constructing Non-linear Cellular Automata with Period 2n − 1 -- Systolic Dissemination in the Arrowhead Family...”
Book
20
Published 2004
Table of Contents:
“... Languages by Learnable Rewriting Systems -- A Divide-and-Conquer Approach to Acquire Syntactic Categories...”
Book


