Chinese lotto as an exhaustive code-breaking machine
暂无分享,去创建一个
[1] Mark Horowitz,et al. ATUM: a new technique for capturing address traces using microcode , 1986, ISCA '86.
[2] Yale N. Patt,et al. The use of microcode instrumentation for development, debugging and tuning of operating system kernels , 1988, SIGMETRICS 1988.
[3] Jean-Jacques Quisquater,et al. How Easy is Collision Search. New Results and Applications to DES , 1989, CRYPTO.
[4] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[5] Wen-mei W. Hwu,et al. Benchmark characterization for experimental system evaluation , 1990, Twenty-Third Annual Hawaii International Conference on System Sciences.
[6] Arjen K. Lenstra,et al. Factoring by Electronic Mail , 1990, EUROCRYPT.
[7] François Morain,et al. Distributed Primality Proving and the Primality of (23539+1)/3 , 1991, EUROCRYPT.
[8] Jean-Jacques Quisquater,et al. Secret Distribution of Keys for Public-Key Systems , 1987, CRYPTO.
[9] M. Conrad. The lure of molecular computing: While marketable products seem decades away, researchers are crystallizing theories and devices that will give biological organisms the power to compute , 1986, IEEE Spectrum.
[10] Henry M. Levy,et al. On the use of benchmarks for measuring system performance , 1982, CARN.
[11] Ralph Howard,et al. Data encryption standard , 1987 .
[12] E.S. Davidson,et al. The effects of memory latency and fine-grain parallelism on Astronautics ZS-1 performance , 1990, Twenty-Third Annual Hawaii International Conference on System Sciences.
[13] Jean-Jacques Quisquater,et al. How Easy is Collision Search? Application to DES (Extended Summary) , 1990, EUROCRYPT.
[14] Yvo Desmedt,et al. Is There an ultimate Use of Cryptography? , 1986, CRYPTO.
[15] Steve R. White. Covert Distributed Processing with Computer Viruses , 1989, CRYPTO.
[16] Robert P. Colwell,et al. Instruction Sets and Beyond: Computers, Complexity, and Controversy , 1985, Computer.
[17] James E. Smith,et al. Characterizing computer performance with a single number , 1988, CACM.
[18] Yvo Desmedt,et al. Several Exhaustive Key Search Machines and DES , 1986, International Conference on the Theory and Application of Cryptographic Techniques.