×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [triple encryption]
Identity Based Secure Distributed Storage Scheme
931 views
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic
244 views
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher)
232 views
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc. Nathan Keller Bar Ilan University Joint with Itai Dinur,
217 views
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc
37 views