Block cipher

Results: 1020



#Item
871Differential cryptanalysis / Key schedule / Stream ciphers / Serpent / Q / Advanced Encryption Standard / ICE / Cipher / SC2000 / Cryptography / Block ciphers / Linear cryptanalysis

PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2

Add to Reading List

Source URL: www.ist-ubisecsens.org

Language: English - Date: 2009-04-14 16:49:11
872Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
873Symmetric-key algorithm / Block cipher / Camellia / Cryptographic hash function / Cipher / Cryptographic primitive / ESTREAM / Outline of cryptography / Crypto++ / Cryptography / Advanced Encryption Standard / Stream ciphers

Lightweight Cryptography for the Internet of Things Masanobu Katagi and Shiho Moriai Sony Corporation

Add to Reading List

Source URL: www.iab.org

Language: English - Date: 2011-03-25 11:03:50
874Ciphertext / Cipher / Transposition cipher / Stream cipher / Advanced Encryption Standard / Block cipher / Caesar cipher / Classical cipher / Cryptography / Permutations / Substitution cipher

CSC 405 Introduction to Computer Security Homework Assignment #1 Solutions

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:18:44
875Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
876SNOW / Block cipher / Cipher / Mathematics / Applied mathematics / Computer programming / SOBER / Grain / Stream ciphers / SOSEMANUK / Linear feedback shift register

Improved Guess and Determine Attack on SOSEMANUK Hadi Ahmadi 1, Taraneh Eghlidos 2, Shahram Khazaei 3

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-01-02 05:24:50
877Grain / RC4 / Phelix / One-time pad / Py / Cipher / Advantage / Block cipher / Rabbit / Stream ciphers / Cryptography / Keystream

Attack the Dragon H˚ akan Englund and Alexander Maximov

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-14 05:17:45
878VEST / Block cipher / Linear feedback shift register / Cube attack / Grain / Stream ciphers / Cryptography / Trivium

Trivium Specifications Christophe De Canni`ere

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:56
879Keystream / Block cipher / MUGI / Initialization vector / Weak key / Grain / QUAD / Cryptography / Stream ciphers / RC4

Dragon: A Fast Word Based Stream Cipher K. Chen1 , M. Henricksen1 , W. Millan1 , J. Fuller1 , L. Simpson1 , E. Dawson1 , H. Lee2 , and S. Moon3

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:53
880PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-30 12:10:14
UPDATE