Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses. --- Accès --- Contrôle --- Congrès --- Accès --- Contrôle --- Congrès --- Congresses
Choose an application
Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Access control --- Congresses. --- Accès --- Contrôle --- Congrès --- Accès --- Contrôle --- Congrès --- Congresses
Choose an application
Beroepen --- Bouwnijverheid --- Construction --- Immobilier --- Immobiliën --- Professions --- 347.235 --- 351.82*8 --- 332.7 <493> --- 13.01.B --- Onroerende eigendom. Grondbezit. Kadaster --- Beroepenrecht. Vestigingswetgeving --- Wettelijke en contractuele aansprakelijkheid ; Algemeen ; België --- 351.82*8 Beroepenrecht. Vestigingswetgeving --- 347.235 Onroerende eigendom. Grondbezit. Kadaster --- AGENT IMMOBILIER --- DROIT ECONOMIQUE ET COMMERCIAL --- STATUT LEGAL --- ACCES A LA PROFESSION
Choose an application
Electronics --- Code division multiple access --- Accès multiple par différence de code --- Telecommunicatie --- 621.391 --- #KVIV:BB --- CDMA (Telecommunication) --- Spread spectrum multiple access --- Cell phone systems --- Multiplexing --- Spread spectrum communications --- General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- 621.391 General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- Accès multiple par différence de code --- Cdma division multiple access
Choose an application
This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses. --- Accès --- Contrôle --- Mots de passe --- Congrès --- Accès --- Contrôle --- Congrès --- Congresses --- Data encryption (Computer science). --- Computer software. --- Coding theory. --- Combinatorics. --- Algorithms. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Algorism --- Algebra --- Arithmetic --- Combinatorics --- Mathematical analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Foundations
Choose an application
European Union --- Intergovernmental Conference --- Treaty on European Union --- European Union countries --- Pays de l'Union européenne --- Politics and government --- Treaties --- Revision --- Politique et gouvernement --- Traités --- Révision --- Législation --- legislation --- Échange d'information --- Information exchange --- Traite --- milking --- Accès a l'information --- Access to information --- commission europeenne --- union europeenne --- congres --- europese commissie --- europese unie --- congressen --- Social Sciences and Humanities. Public Administration --- International Intergovernmental Organisations --- European Union. --- Pays de l'Union européenne --- Traités --- Révision --- 339.5 --- legislation. --- Union europeenne --- Histoire --- Sources --- Commission europeenne --- Transparence --- Parlement europeen
Listing 1 - 6 of 6 |
Sort by
|