×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [triple encryption]
Engineering
Identity Based Secure Distributed Storage Scheme
929 views
Documents
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic
243 views
Documents
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher)
231 views
Documents
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc. Nathan Keller Bar Ilan University Joint with Itai Dinur,
217 views
Documents
Dissect and conquer: New algorithms for cryptanalysis of multiple encryption, knapsacks, etc
37 views