Block cipher

Results: 1020



#Item
251Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
252Feistel cipher / ICE / Block cipher / Advanced Encryption Standard / Advantage / Permutations / Data Encryption Standard / Cryptography / Keccak / NIST hash function competition

LHash: A Lightweight Hash Function (Full Version)⋆ Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, and Le Dong Institute of Software, Chinese Academy of Sciences, Beijing, P.R. China {wwl,zhanglei}@tca.iscas.ac.cn

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-25 09:43:17
253Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
254Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
255Advantage / Ciphertext / Stream cipher / Chosen-plaintext attack / Cipher / Block size / Initialization vector / Index of cryptography articles / Cryptography / Block cipher / Authenticated encryption

ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-07-29 09:57:15
256Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE

Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:13
257Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
258Linear cryptanalysis / Differential cryptanalysis / ICE / Authenticated encryption / Stream ciphers / Cryptography / Advanced Encryption Standard / Block cipher

Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Beg¨ ul Bilgin1,2 , Andrey Bogdanov3 , Miroslav Kneˇzevi´c4 , Florian Mendel5 , and Qingju Wang1,6 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:35:21
259CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
260MUGI / MISTY1 / Cipher / Feistel cipher / Block size / Q / Symmetric-key algorithm / RC4 / SNOW / Cryptography / Stream ciphers / Block cipher

Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-16 22:19:01
UPDATE