Block cipher

Results: 1020



#Item
391Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
392Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
393Transport Layer Security / Chosen-plaintext attack / HTTP Secure / Ciphertext / Block cipher modes of operation / Authenticated encryption / Password / Probabilistic encryption / Known-plaintext attack / Cryptography / Security / Initialization vector

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard∗ May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-05-12 09:31:48
394Blowfish / Symmetric-key algorithm / KHAZAD / Block size / Square / Cipher / Advanced Encryption Standard / Data Encryption Standard / MARS / Cryptography / Block ciphers / Twofish

Programming with GNU Crypto Version 2.0.0, 9 November 2003 Casey Marshall Raif S. Naffah

Add to Reading List

Source URL: www.gnu.org

Language: English - Date: 2003-11-08 19:11:09
395Key schedule / ICE / Block cipher / FEAL / Cryptanalysis / VEST / Piling-up lemma / Differential-linear attack / Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Improved Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh1 , Hoda A. Alkhzaimi2 , Mohammad Reza Aref1 , Nasour Bagheri3 , Praveen Gauravaram4 , and Martin M. Lauridsen2 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-31 06:20:57
396ID-based encryption / Block cipher modes of operation / RSA / Cramer–Shoup cryptosystem / Authenticated encryption / Cryptography / Public-key cryptography / Cipher

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
397Field-programmable gate array / Advanced Encryption Standard / Lookup table / Data Encryption Standard / ICE / Block cipher / S-box / Xilinx / Bitstream / Cryptography / Computing / Reconfigurable computing

1 FPGA Trojans through Detecting and Weakening of Cryptographic Primitives Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, and Christof Paar, Fellow, IEEE Horst G¨ortz Institute for IT Security, Ruhr University Bochum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 14:41:24
398Side channel attack / Advanced Encryption Standard / Espionage / Algorithm / Block cipher / Fault injection / Applied mathematics / Cryptography / Theoretical computer science / Software testing

A Unified Formalism for Physical Attacks H´el`ene Le Bouder1,2 , Ronan Lashermes1,3 , Yanis Linge4 , Bruno Robisson1,3 , and Assia Tria1,3 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 11:07:10
399Initialization vector / Cipher / Substitution cipher / WAKE / A5/1 / Keystream / Py / Correlation attack / Grain / Cryptography / Stream ciphers / Block cipher

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina [removed] August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 09:57:44
400Hashing / Merkle–Damgård construction / Hash function / Collision resistance / Crypt / Block cipher / Information retrieval / Computing / Artificial intelligence / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:52
UPDATE