Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
54 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.3 - DATA ENCRYPTION
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Highly Nonlinear t-Resilient Functions
Kaoru Kurosawa
,
Takashi Satoh
,
Kentaro Yamamoto
10.3217/jucs-003-06-0721
28-06-1997
Unique: 372 | Total: 427
| Access Period:
721-729
HTML
XML
PDF
Research Article
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes
Xian-Mo Zhang
,
Yuliang Zheng
10.3217/jucs-002-03-0147
28-03-1996
Unique: 362 | Total: 424
| Access Period:
147-162
HTML
XML
PDF
Research Article
Government, Cryptography, and the Right to Privacy
Jenny Shearer
,
Peter Gutmann
10.3217/jucs-002-03-0113
28-03-1996
Unique: 389 | Total: 449
| Access Period:
113-146
HTML
XML
PDF
Research Article
Testing a High-Speed Data Path The Design of the RSAb Crypto Chip
Wolfgang Mayerwieser
,
Karl Posch
,
Reinhard Posch
,
Volker Schindler
10.3217/jucs-001-11-0728
28-11-1995
Unique: 358 | Total: 435
| Access Period:
728-743
HTML
XML
PDF
Research Article
GAC - the Criterion for Global Avalanche Characteristics of Cryptographic Functions
Xian-Mo Zhang
,
Yuliang Zheng
10.3217/jucs-001-05-0320
28-05-1995
Unique: 345 | Total: 411
| Access Period:
320-337
HTML
XML
PDF
Research Article
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions
Jennifer Seberry
,
Xian-Mo Zhang
,
Yuliang Zheng
10.3217/jucs-001-02-0136
28-02-1995
Unique: 343 | Total: 393
| Access Period:
136-150
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK