![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | A Countermeasure Aga..> | 2011-02-04 12:56 | 246K | |
![]() | A New Version of Gra..> | 2011-02-07 15:17 | 204K | |
![]() | A Spectral Approach ..> | 2011-02-07 15:17 | 362K | |
![]() | Cryptanalysis of TWI..> | 2011-02-07 15:16 | 3.2M | |
![]() | Employment of Homoph..> | 2011-02-07 15:17 | 204K | |
![]() | Extending the Salsa2..> | 2011-02-07 15:17 | 340K | |
![]() | Finding Optimal Bits..> | 2011-02-07 15:16 | 215K | |
![]() | Further More on Key ..> | 2011-02-03 14:18 | 196K | |
![]() | Improved Linear Cryp..> | 2011-02-07 15:16 | 191K | |
![]() | On the security of t..> | 2011-02-07 15:16 | 263K | |
![]() | Software speed of st..> | 2011-02-07 15:17 | 308K | |