Block ciphers

Results: 398



#Item
151InSight: RIVIER ACADEMIC JOURNAL, VOLUME 6, NUMBER 2, FALL[removed]ADVANCED ENCRYPTION STANDARD Douglas Selent* Student, M.S. Program in Computer Science, Rivier College Abstract

InSight: RIVIER ACADEMIC JOURNAL, VOLUME 6, NUMBER 2, FALL[removed]ADVANCED ENCRYPTION STANDARD Douglas Selent* Student, M.S. Program in Computer Science, Rivier College Abstract

Add to Reading List

Source URL: www.rivier.edu

Language: English - Date: 2010-11-24 19:07:40
152A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
153On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
154ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

Add to Reading List

Source URL: srtp.sourceforge.net

Language: English - Date: 2004-08-16 14:34:48
1554-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:09:35
1563-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
157PRACTICAL CRYPTOGRAPHY Algorithms and Implementations Using C++ Edited by

PRACTICAL CRYPTOGRAPHY Algorithms and Implementations Using C++ Edited by

Add to Reading List

Source URL: www.ittoday.info

Language: English - Date: 2015-02-10 15:23:47
158Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
159Microsoft Word - DN_HDN_EN.doc

Microsoft Word - DN_HDN_EN.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-14 11:21:26
160Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Helix Fast Encryption and Authentication in a Single Cryptographic Primitive Niels Ferguson1 , Doug Whiting2 , Bruce Schneier3 , John Kelsey4 , Stefan Lucks5 , and Tadayoshi Kohno6 1

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30