Block ciphers

Results: 398



#Item
91Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
92Key schedule / Py / Cipher / ICE / RC4 / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-03 23:50:29
93Key generation / Block ciphers / Disk encryption / Block cipher modes of operation / Cryptography / SEED / Key Wrap

SEED Algorithm Object Identifiers. SEED Algorithm Object Identifiers

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
94

Block Ciphers based on Algebraic structure and its Hardware Implementation

Add to Reading List

Source URL: www.centrum.bezpieczenstwa.pl

Language: Polish - Date: 2012-07-08 14:41:06
    95Finite fields / Rijndael S-box / Q / Square / Key schedule / Serpent / Cryptography / Advanced Encryption Standard / Block ciphers

    Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs Francois-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat UCL Crypto Group

    Add to Reading List

    Source URL: www.intopix.com

    Language: English - Date: 2007-11-14 11:05:56
    96Reconfigurable computing / Field-programmable gate array / Block ciphers / AES implementations / DEAL / Xilinx / LEX / Advanced Encryption Standard process / CRYPTON / Cryptography / Advanced Encryption Standard / Data Encryption Standard

    Contents I Compact and Efficient Encryption/Decryption Module Implementation of AES I.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .

    Add to Reading List

    Source URL: www.intopix.com

    Language: English - Date: 2007-11-14 11:11:18
    97Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

    Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

    Add to Reading List

    Source URL: www.chiark.greenend.org.uk

    Language: English - Date: 2010-08-20 09:24:45
    98Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

    Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

    Add to Reading List

    Source URL: www.chiark.greenend.org.uk

    Language: English - Date: 2010-08-20 09:24:51
    99National Security Agency / Block ciphers / Skipjack / Capstone / Fortezza / Key size / CDMF / Key / Symmetric-key algorithm / Cryptography / Key management / Data Encryption Standard

    How to Reverse Engineer an EES Device Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

    Add to Reading List

    Source URL: www.chiark.greenend.org.uk

    Language: English - Date: 2010-08-20 09:24:49
    UPDATE