Skip to search formSkip to main contentSkip to account menu

LEVIATHAN (cipher)

Known as: Leviathan (disambiguation), Leviathan cipher 
LEVIATHAN is considered broken due to distinguishing attacks which require 236 bytes of output and comparable effort.
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Introduction Patricia Springborg 1. Of Man 1.1 Hobbes's visual strategy Horst Bredekamp 1.2 The beast of myth: Medusa, Dionysus… 
Highly Cited
2006
Highly Cited
2006
Acknowledgments and Preface. Part I: Movements and Globalization. 1. Globalization. 2. Movements and Action. Part II: From… 
2004
2004
Does the concept of path dependence provide a plausible theoretical framework for historical institutionalism? Practitioners of… 
1999
1999
This article argues that the modern concept of the state of nature as the defining claim of IR theory was developed in the course… 
Review
1996
Review
1996
A defence of true liberty of human actions from antecedent or extrinsic necessity [1655] John Bramhall 253pp Observations…