Block ciphers

Results: 398



#Item
111Block ciphers / Serpent / Data Encryption Standard / Key schedule / Field-programmable gate array / Q / Py / RC6 / Twofish / Cryptography / Advanced Encryption Standard / Stream ciphers

A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES RIJNDAEL François-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:05:31
112Key schedule / Twofish / Block ciphers / ICE / Entropy / Key size / Fortuna / Crypt / S-box / Cryptography / Advanced Encryption Standard / Key management

Twofish Technical Report #4 Further Observations on the Key Schedule of Twofish Doug Whiting∗ John Kelsey†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
113Blowfish / Advanced Encryption Standard / MacGuffin / Feistel cipher / ICE / Lucifer / SAFER / S-box / Khufu and Khafre / Cryptography / Block ciphers / Twofish

Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
114Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
115Computer architecture / Embedded systems / PIC microcontroller / Block ciphers / In-circuit serial programming / Microchip Technology / MiWi / Oscillator start-up timer / UNI/O / Microcontrollers / Electronics / Electronic engineering

PIC16(L)F1826/27 Data SheetPin Flash Microcontrollers with nanoWatt XLP Technology  2011 Microchip Technology Inc.

Add to Reading List

Source URL: www.electronicaestudio.com

Language: English - Date: 2011-12-05 14:52:43
116Block cipher / Key schedule / Linear cryptanalysis / Advanced Encryption Standard / Cryptanalysis / VEST / Cipher / Feistel cipher / FEAL / Cryptography / Stream ciphers / Differential cryptanalysis

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
117Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
118Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
119Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
120Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 23:11:43
UPDATE