Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,427,400 papers from all fields of science
Search
Sign In
Create Free Account
REDOC
Known as:
REDOC-II
, REDOC-III
In cryptography, REDOC II and REDOC III are block ciphers designed by Michael Wood (cryptographer) for Cryptech Inc and are optimised for use in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Block cipher
Cryptography
Differential cryptanalysis
Known-plaintext attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Effect of Potassium on Sol-Gel Cerium and Lanthanum Oxide Catalysis for Soot Combustion
D. Salinas
,
G. Pecchi
,
V. Rodríguez
,
J. Fierro
2015
Corpus ID: 55211006
The catalytic activity in the soot combustion is reported for a series of potassium-promoter alumina supported catalysts prepared…
Expand
2015
2015
Catalytic Performance of La0.6Ca0.4Fe1-xNixO3 Perovskites in DME Oxidation
G. Pecchi
,
R. Morales
,
D. Salinas
,
E. Delgado
,
J. Fierro
2015
Corpus ID: 96610574
Substituted La0.6Ca0.4Fe1-xNixO3 (0.0 ≤ x ≤ 1.0) perovskite-type oxides prepared by the amorphous citrate method have been…
Expand
2014
2014
CATALYTIC COMBUSTION OF SOOT ON Ce-DOPED LANTHANUM COBALTITES
G. Pecchi
,
R. Morales
,
E. Delgado
,
Romel Jiménez
,
M. A. Fraga
2014
Corpus ID: 55652945
Substituted La 1-x Ce x CoO 3 perovskite-type oxides (0.0≤x≤0.9), prepared by the self-combustion method, have been investigated…
Expand
2013
2013
KINETIC STUDY OF THE HYDROGENATION OF CITRAL ON Ir PROMOTED Au/TiO2 CATALYST
José J. Martínez
,
H. Rojas
,
P. Reyes
2013
Corpus ID: 55742761
ABSTRACT A kinetic study of citral hydrogenation over an Au-Ir/TiO 2 catalyst was performed with the aim to understand the effect…
Expand
2001
2001
Differential Crypt analysis of Snefru , Khafre , REDOC-11 , LOKI and Lucifer ( ExteIided Abstract )
E. Biham
,
Shamzr
2001
Corpus ID: 84181263
In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the…
Expand
1997
1997
Implementing block ciphering algorithms in hardware
Fabio Guerrero
,
J. Noras
1997
Corpus ID: 62163138
Many ciphering algorithms map efficiently into hardware, giving encryption with very high throughput. Hardware designs are…
Expand
Review
1996
Review
1996
Extracting business rules from source code
H. Sneed
,
Katalin Erdös
WPC '96. 4th Workshop on Program Comprehension
1996
Corpus ID: 31840281
The paper reviews the state of the art on application knowledge acquisition from existing software systems and defines the role…
Expand
1995
1995
Perspectives pour REDOC
C. Guitart
1995
Corpus ID: 132729377
Pour que le reseau documentaire de Grenoble REDOC fonctionne, il faut tout d'abord consolider le reseau avec un programme de…
Expand
1995
1995
Ciphering hardware for high-speed digital networks: a REDOC III implementation
J. Noras
1995
Corpus ID: 62758718
REDOC III, an algorithm for data ciphering with a predicted throughput in hardware of over 1 Gbit/s, is a proposed replacement…
Expand
1995
1995
REDOC : le réseau documentaire de Grenoble
M. Rouhet
1995
Corpus ID: 133279380
Le reseau documentaire de Grenoble valorise ses ressources documentaires. Apres un historique de la mise en place du reseau…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE