Block cipher

Results: 1020



#Item
221Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
222Field-programmable gate array / Xilinx / Symmetric-key algorithm / Key / Public-key cryptography / Block cipher / Brute-force attack / Partial re-configuration / Cryptography / Key management / Reconfigurable computing

Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable Device

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-06-04 18:22:14
223Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
224Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 23:11:43
225Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
226Randomness / Block cipher / Cryptography / Pseudorandomness

STREAM CIPHERS and PRGs Stateful Generators Initially, St is a random seed

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-21 12:18:18
227Permutation / Mihir Bellare / Inverse function / Inverse / Function / Lucifer / Format-preserving encryption / Advantage / Cryptography / Mathematics / Block cipher

BLOCK CIPHERS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-02 14:28:56
228Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-12 10:35:54
229Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
230Advanced Encryption Standard / K1 / Differential cryptanalysis / Slide attack / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks Bauhaus-University Weimar, Germany {farzaneh.abed,eik.list,stefan.lucks}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 07:31:29
UPDATE