Please use this identifier to cite or link to this item:
http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/7424
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Roy, Dibyendu | - |
dc.date.accessioned | 2017-03-09T10:33:24Z | - |
dc.date.available | 2017-03-09T10:33:24Z | - |
dc.date.issued | 2016-09-01 | - |
dc.identifier.govdoc | NB15637 | - |
dc.identifier.uri | http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/7424 | - |
dc.language.iso | en | en |
dc.publisher | IIT, Kharagpur | en |
dc.subject | Fault Attack | en |
dc.subject | Decomposition of Boolean Function | en |
dc.subject | Bent Function | en |
dc.subject | Boolean Function | en |
dc.subject | ACORN | en |
dc.subject | Authenticated Encryption | en |
dc.subject | Algebraic Cryptanalysis | en |
dc.title | A Study on Selective Stream Ciphers and Construction of T-Function | en |
dc.type | Thesis | en |
Appears in Collections: | A Study on Selective Stream Ciphers and Construction of T-Function |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
NB15637_Abstract.pdf | 61.04 kB | Adobe PDF | ![]() View/Open | |
NB15637_Thesis.pdf Restricted Access | 801.75 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.