Font Size:
a
A
A
Keyword [Round-Reduced]
Result: 1 - 4 | Page: 1 of 1
1.
Research And Implementation Of Image Encryption And Copyright Protection
2.
Security Analysis And Implementation Of Keccak In SHA-3 Standard
3.
Conditional Cube Attack On Round-Reduced Keyak With Prefixed Message
4.
Cryptanalysis Of Round-reduced AES And Round-reduced PRINCE
<<First
<Prev Next>
Last>>
Jump to