Search results
Jump to navigation
Jump to search
- {{Short description|Cryptographic structure used in block ciphers}} ...hz.ch/eserv/eth:38650/eth-38650-02.pdf On the design and security of block ciphers]''. ETH Series in Information Processing, vol. 1, Hartung-Gorre, Konstanz, ...5 KB (870 words) - 03:37, 9 November 2024
- ...7 (saying "extras" may be standardized in the future).</ref> and [[AEAD]] ciphers Keyak and Ketje.<ref name="ketje">{{Cite web|url=https://competitions.cr.yp ...nless the user is worried about significant advancements in the speed of ''classical'' computers. For resistance against ''quantum'' computers, see below. ...52 KB (7,730 words) - 18:17, 7 February 2025
- ...LO1YoC&q=262537412640768743.99999999999925&pg=PA107|title=Modular Forms: A Classical and Computational Introduction|author=L. J. Lloyd James Peter Kilford|publi |[[Mills' constant]]<ref>{{cite book|title=Stealth Ciphers|author=Laith Saadi|publisher=Trafford Publishing|year=2004|isbn=978-1-4120- ...97 KB (12,300 words) - 09:02, 7 February 2025