Introduction; E. Kranakis, P. van Oorschot. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption; D.R. Stinson. MD2 is not Secure Without the Checksum Byte; N. Rogier, P. Chauvaud. On the Weaknesses of Non-Surjective Round Functions; V. Rijmen, et al. Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis; J. Lee, et al. Constructing Symmetric Ciphers Using the CAST Design Procedure; C.M. Adams.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want