Block cipher

Results: 1020



#Item
211Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
212Block cipher / Key schedule / Linear cryptanalysis / Advanced Encryption Standard / Cryptanalysis / VEST / Cipher / Feistel cipher / FEAL / Cryptography / Stream ciphers / Differential cryptanalysis

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
213Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
214ICE / Block cipher / Data Encryption Standard / MacGuffin / S-box / Ping / Computing / Software / System software / Computer arithmetic / Q

The MacGun Block Cipher Algorithm Matt Blaze AT&T Bell Laboratories 101 Crawfords Corner Road, Holmdel, NJUSA

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
215Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
216Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
217Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
218Block cipher / Q / Finite fields / XSL attack / Encryption by date / Cryptography / Advanced Encryption Standard / Polynomial

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-20 03:30:14
219KASUMI / Block cipher / VEST / Feistel cipher / Linear cryptanalysis / SC2000 / Data Encryption Standard / Cryptography / Differential cryptanalysis / MISTY1

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
220Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
UPDATE