Please use this identifier to cite or link to this item:
http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/7967
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Saha, Dhiman | - |
dc.date.accessioned | 2017-07-27T11:30:01Z | - |
dc.date.available | 2017-07-27T11:30:01Z | - |
dc.date.issued | 2017-06-01 | - |
dc.identifier.govdoc | NB15764 | - |
dc.identifier.uri | http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/7967 | - |
dc.language.iso | en | en |
dc.publisher | IIT, Kharagpur | en |
dc.subject | Sha3 | en |
dc.subject | Caesar | en |
dc.subject | Authenticated Encryption | en |
dc.subject | Symmetric Key | en |
dc.subject | Authenticated Encryption | en |
dc.subject | Cryptanalysis | en |
dc.title | Cryptanalysis of Hash Functions and Authenticated Encryption Schemes | en |
dc.type | Thesis | en |
Appears in Collections: | Cryptanalysis of Hash Functions and Authenticated Encryption Schemes |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
NB15764_Abstract.pdf | 100.56 kB | Adobe PDF | ![]() View/Open | |
NB15754_Thesis.pdf Restricted Access | 9.71 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.