Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
167 | Rudolf Bayer, J. K. Metzger |
On the Encipherment of Search Trees and Random Access Files. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
encipherment, indexed sequential files, privacy transformation, random access files, security, privacy, cryptography, indexes, paging, protection, B-trees, search trees |
90 | R. W. Jones |
User Functions for the Generation and Distribution of Encipherment Keys. |
EUROCRYPT |
1984 |
DBLP DOI BibTeX RDF |
|
70 | Akihiro Shimizu, Shoji Miyaguchi |
Fast Data Encipherment Algorithm FEAL. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
70 | Donald W. Davies, Graeme I. P. Parkin |
The average Cycle size of the Key-Stream in Output Feedback Encipherment. |
EUROCRYPT |
1982 |
DBLP DOI BibTeX RDF |
|
50 | Kazuo Ohta, Kazumaro Aoki |
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
50 | R. W. Jones, M. S. J. Baxter |
The Role of Encipherment Services in Distributed Systems. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
40 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
40 | Donald W. Davies, Wyn L. Price |
Engineering Secure Information Systems. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
30 | Keagan Brewer |
'I beg your grace to suppress this chapter or else to have it written in secret letters': The Emotions of Encipherment in Late-Medieval Gynaecology. |
VOY |
2022 |
DBLP BibTeX RDF |
|
30 | Claire Bowern, Daniel Gaskell |
Enciphered after all? Word-level Text Metrics are Compatible with some Types of Encipherment. |
VOY |
2022 |
DBLP BibTeX RDF |
|
30 | Jin-Kyoung Heo |
Distributed Object Activation for Web Application Encipherment Key. |
J. Convergence Inf. Technol. |
2009 |
DBLP BibTeX RDF |
|
30 | JinKyoung Heo |
Web Application Encipherment Key Management using Distributed Object Activation. |
J. Digit. Content Technol. its Appl. |
2009 |
DBLP BibTeX RDF |
|
30 | JinKyoung Heo |
Encipherment Key Management System for Massive Web Contents. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
object activation, security, distributed processing |
30 | Sung-Yeal Im, Ki-Dong Chung |
A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. |
Security and Management |
2005 |
DBLP BibTeX RDF |
|
30 | Cees J. A. Jansen, Piet van der Vlist |
Message encipherment with minimal expansion and redundancy - doing better than ISO-10126. |
Comput. Secur. |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Thomas Hardjono, Jennifer Seberry |
Search Key Substitution in the Encipherment of B-Trees. |
VLDB |
1990 |
DBLP BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication procedures. |
RFC |
1989 |
DBLP DOI BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. |
RFC |
1988 |
DBLP DOI BibTeX RDF |
|
30 | Akihiro Shimizu, Shoji Miyaguchi |
FEAL - Fast Data Encipherment Algorithm. |
Syst. Comput. Jpn. |
1988 |
DBLP DOI BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. |
RFC |
1987 |
DBLP DOI BibTeX RDF |
|
30 | Gilbert Bloch, Ralph Erskine |
Enigma: the Dropping of the Double Encipherment. |
Cryptologia |
1986 |
DBLP DOI BibTeX RDF |
|
30 | Józef P. Pieprzyk, Dominik Rutkowski |
Modular design of information encipherment for computer systems. |
Comput. Secur. |
1985 |
DBLP DOI BibTeX RDF |
|
30 | Alan G. Konheim |
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
30 | Donald W. Davies, Graeme I. P. Parkin |
The Average Cycle Size of the Key Stream in Output Feedback Encipherment. |
CRYPTO |
1982 |
DBLP DOI BibTeX RDF |
|
30 | Rudolf Bayer, J. K. Metzger |
On the Encipherment of Search Trees and Random Access Files. |
VLDB |
1975 |
DBLP DOI BibTeX RDF |
|
30 | Theodore D. Friedman, Lance J. Hoffman |
Execution Time Requirements for Encipherment Programs. |
Commun. ACM |
1974 |
DBLP DOI BibTeX RDF |
|
20 | David M. Horan, Richard A. Guinee |
A novel pseudorandom binary sequence generator for keystream generation. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Sabah Mohammed, Jinan Fiaidhi |
Developing Secure Transcoding Intermediary for SVG Medical Images within Peer-to-Peer Ubiquitous Environment. |
CNSR |
2005 |
DBLP DOI BibTeX RDF |
P2P Ubiquitous Environments, Image Transcoding, XML Encryption, SVG, JXTA |
20 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
20 | Eiji Okamoto |
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
20 | A. R. Prieto, J. G. Tomas |
A model to order the encryption algorithms according to their quality. |
Comput. Commun. Rev. |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Marc Girault |
Hash-Functions Using Modulo-N Operations. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Walter Fumy |
On the F-function of FEAL. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Wyn L. Price |
Standards for Data Security - A Change of Direction. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Don Coppersmith |
Another Birthday Attack. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|
20 | Don Coppersmith |
The Real Reason for Rivest's Phenomenon. |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
|