Block ciphers

Results: 398



#Item
141Very Compact Hardware Implementations of the Blockcipher CLEFIA Toru Akishita and Harunaga Hiwatari Sony Corporation {Toru.Akishita,Harunaga.Hiwatari}@jp.sony.com

Very Compact Hardware Implementations of the Blockcipher CLEFIA Toru Akishita and Harunaga Hiwatari Sony Corporation {Toru.Akishita,Harunaga.Hiwatari}@jp.sony.com

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2011-06-14 23:29:05
142Automatic Formal Verification of Block Cipher Implementations

Automatic Formal Verification of Block Cipher Implementations

Add to Reading List

Source URL: verify.stanford.edu

Language: English - Date: 2010-02-18 01:25:10
143Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Phelix Fast Encryption and Authentication in a Single Cryptographic Primitive Doug Whiting1 , Bruce Schneier2 , Stefan Lucks3 , and Fr´ed´eric Muller4 1 HiFn,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
144Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
145Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Cryptography for the Internet E-mail and other information sent electronically are like digital postcards—they afford little privacy. Well-designed cryptography systems can ensure the secrecy of such transmissions by P

Add to Reading List

Source URL: www.philzimmermann.com

Language: English - Date: 2003-06-01 01:29:48
146CS255: Cryptography and Computer Security  Winter 2001 Assignment #1

CS255: Cryptography and Computer Security Winter 2001 Assignment #1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-01-25 15:17:18
147CS255: Cryptography and Computer Security  Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

CS255: Cryptography and Computer Security Winter 2005 Assignment #1 Due: Wednesday, Jan. 26th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-18 19:58:02
148Microsoft PowerPoint - 02-classical_encryption.pptx

Microsoft PowerPoint - 02-classical_encryption.pptx

Add to Reading List

Source URL: faculty.ksu.edu.sa

Language: English - Date: 2009-03-05 06:09:13
149The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 14:55:09
150Improved Linear Trails for the Block Cipher Simon Tomer Ashur ESAT/COSIC KU Leuven and iMinds Leuven, Belgium tomer.ashur @ esat.kuleuven.be

Improved Linear Trails for the Block Cipher Simon Tomer Ashur ESAT/COSIC KU Leuven and iMinds Leuven, Belgium tomer.ashur @ esat.kuleuven.be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 14:24:24