Block cipher

Results: 1020



#Item
701Classical cipher / Abecedarius / Computer programming / Computing / Software engineering

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:04
702Abecedarius / Latin alphabets / Classical cipher / Linguistics

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:03
703Classical cipher / Index of agriculture articles

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:03
704Classical cipher / Four-square cipher

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:07
705Latin alphabets / Classical cipher / Abecedarius

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:04
706Classical cipher / Index of agriculture articles

Pennsylmania Double Acrostic By Don Z. Block, Gr’77 1

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2008-05-01 14:59:06
707University of Cambridge Computer Laboratory / Key schedule / Linear cryptanalysis / Block cipher / Grain / ICE / Advanced Encryption Standard / Cipher / Churning / Cryptography / Stream ciphers / Tiny Encryption Algorithm

A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-14 05:03:01
708Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
709Advanced Encryption Standard / Kernel / Linear map / Matrix / Vector space / Basis / Block cipher / Invariant subspace / Algebra / Mathematics / Linear algebra

New Observations on Rijndael Sean Murphy and Matt Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2002-05-09 05:30:56
710Data Encryption Standard / RC6 / Cryptographic software / Cipher / Key size / Triple DES / Serpent / XSL attack / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

136 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010 Switching between the AES-128 and AES-256 Using Ks * & Two Keys

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2014-03-16 20:13:45
UPDATE