Advanced Encryption Standard

Results: 1268



#Item
281Alpha-numeric grid / Advanced Encryption Standard / Character sets / Road signs in the Netherlands

Differential Fault Analysis of AES using a Single Multiple-Byte Fault Subidh Ali1 , Debdeep Mukhopadhyay1, and Michael Tunstall2 1 Department of Computer Sc. and Engg, IIT Kharagpur, West Bengal, India.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-14 06:50:46
282Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
283Introductory physics / Mechanics / Cryptographic hash functions / Collision / AES implementations / Nonlinear system / Cryptography / Advanced Encryption Standard / Physics

Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1 Chair for Communication Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-20 06:12:45
284Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
285Mathematics / Logic in computer science / Homomorphic encryption / Computational complexity theory / Boolean circuit / Block cipher modes of operation / Advanced Encryption Standard / Circuit / Block cipher / Theoretical computer science / Cryptography / Applied mathematics

Armadillo: a compilation chain for privacy preserving applications Sergiu Carpov, Paul Dubrulle, Renaud Sirdey CEA, LIST, Embedded Real Time & Security Laboratory,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 03:12:34
286Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 08:22:01
287Cryptography / Keccak / Advanced Encryption Standard / JH / SHA-2 / 64-bit / Grøstl / Addressing mode / Bitwise operation / NIST hash function competition / Computer architecture / Computing

SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-09 23:11:17
288Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
289Feistel cipher / ICE / Block cipher / Advanced Encryption Standard / Advantage / Permutations / Data Encryption Standard / Cryptography / Keccak / NIST hash function competition

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
290RSA / Ciphertext stealing / Advanced Encryption Standard / Pseudorandom permutation / Cryptography / Advantage / Authenticated encryption

Revisiting Security Claims of XLS and COPA Mridul Nandi Applied Statistics Unit Indian Statistical Institute, Kolkata

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 03:10:50
UPDATE