6,971 to 6,980 of 8,137 Results
Aug 2, 2020 -
Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Markdown Text - 492 B -
MD5: bb0ce85ce5d10cdcecdc298b87a96bcc
|
Aug 2, 2020 -
Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Python Source Code - 4.7 KB -
MD5: 80400590c7f34863437c54385066c8ee
|
Aug 2, 2020 - Wang Haoyang
Zhenzhen Bao; Ling Ding; Jian Guo; Haoyang Wang; Wenying Zhang, 2020, "Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes", https://doi.org/10.21979/N9/JYECIO, DR-NTU (Data), V1
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 roun... |
Aug 2, 2020 -
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Plain Text - 1.9 MB -
MD5: 8b15a424c205e15866b10be52306478a
|
Aug 2, 2020 -
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Plain Text - 2.1 KB -
MD5: 69f377266a59603f144c0103708e7af5
|
Aug 2, 2020 -
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Plain Text - 1.9 MB -
MD5: 0b243aacd5e58aad5476176231d2c0fa
|
Aug 2, 2020 -
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Plain Text - 2.1 KB -
MD5: 8738bdc8a2f15133c180ce052610e706
|
Aug 2, 2020
|
Jul 21, 2020 - Reuters News Corpus
Cheong, Siew Ann, 2020, "Zip's Law Null Model Samples for Reuters News Corpus", https://doi.org/10.21979/N9/EC76OJ, DR-NTU (Data), V1
npy files containing Zipf's Law null model samples for Reuters news corpus. |
Jul 21, 2020 -
Zip's Law Null Model Samples for Reuters News Corpus
Unknown - 10.2 MB -
MD5: c853233b5511dc27782d5ce1d6fa6b96
|
