Block cipher

Results: 1020



#Item
791Initialization vector / Cipher / Py / Rabbit / Crypt / MMH-Badger MAC / Cryptography / Stream ciphers / Block cipher modes of operation

Rabbit Stream Cipher, Algorithm Specification May 12, 2005

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 16:04:52
792NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
793Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

Add to Reading List

Source URL: www.math.huji.ac.il

Language: English - Date: 2010-09-02 14:16:20
794Q / Block cipher / Twofish / E2 / Field / Linear combination / Key schedule / Rijndael S-box / Cryptography / Advanced Encryption Standard / Serpent

A simple algebraic representation of Rijndael

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2003-08-01 15:27:05
795ICE / Key schedule / Block cipher / Cryptanalysis / Differential of a function / Differential / Boomerang attack / FEAL / Cryptography / Differential cryptanalysis / Feistel cipher

BRICS BRICS RS-95-9

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1996-10-15 07:49:33
796Block ciphers / Differential cryptanalysis / Key schedule / Impossible differential cryptanalysis / Cipher / Linear cryptanalysis / Differential / SHARK / Cryptography / Mathematical analysis / Espionage

Impossible Dif ferential Cryptanalysis of SPN Ciphers Ruilin Li1 , Bing Sun1 and Chao Li1,2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-29 05:10:15
797XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
798Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
799Diagrams / Infographics / Enterprise modelling / Science / Functional flow block diagram / Function model / IDEF0 / International Obfuscated C Code Contest / Classical cipher / Systems analysis / Systems engineering / Systems science

Relationships between Common Graphical Representations Used in Systems Engineering

Add to Reading List

Source URL: www.vitechcorp.com

Language: English - Date: 2009-04-01 06:50:56
800Block cipher / Data Encryption Standard / Key schedule / Weak key / Ciphertext / Cryptanalysis / Linear cryptanalysis / ICE / Cipher / Cryptography / Differential cryptanalysis / Advanced Encryption Standard

Narrow-Bicliques: Cryptanalysis of Full IDEA Dmitry Khovratovich1 , Ga¨etan Leurent2 , and Christian Rechberger3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2013-05-03 05:49:35
UPDATE