Block cipher

Results: 1020



#Item
781Content Protection for Recordable Media / Cryptomeria cipher / 4C Entity / Audio storage / Key management / Device Keys / Media Key Block / Copy protection / DVD-Audio / Cryptography / Advanced Access Content System / DVD

Two key technical components

Add to Reading List

Source URL: www.mrkehm.com

Language: English - Date: 2009-07-14 16:17:05
782Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
783Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
784JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2012-07-05 12:19:19
785Grøstl / SHA-1 / Advanced Encryption Standard / SHA-2 / Tiger / MD5 / Hash function / Permutation / Block cipher / Error detection and correction / Cryptographic hash functions / Cryptography

Grøstl – a SHA-3 candidate ∗

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:38
786Stream ciphers / Threefish / Skein / ICE / VEST / SHA-2 / SHA-1 / Block cipher / Salsa20 / Cryptography / Error detection and correction / Cryptographic hash functions

Improved Cryptanalysis of Skein 3 ¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-08 02:25:05
787Classical cipher / Four-square cipher / Computer programming / Computing / Software engineering

STREET ADDRESS : 228 Fourteenth S t r e e t N.W. MAP 8 PARCEL: 4-293 CENSUS TRACT AND BLOCK : 2- 313

Add to Reading List

Source URL: www.dhr.virginia.gov

Language: English - Date: 2007-02-06 12:02:17
788GOST / Hashing / Advanced Encryption Standard / Block cipher / Grøstl / Cryptography / GOST standards / Cryptographic hash functions

Algebraic Aspects of the Russian Hash Standard GOST R[removed]Oleksandr Kazymyrov, Valentyna Kazymyrova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-03 14:56:20
789GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
790Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
UPDATE