Block ciphers

Results: 398



#Item
161Binary arithmetic / Linear feedback shift register / A5/1 / Cellular automaton / Field-programmable gate array / Digital electronics / Block cipher / XOR gate / Cryptography / Electronic engineering / Stream ciphers

Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-17 09:30:36
162Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
163IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Ciphertext / Cryptography / Computer network security / Cryptographic protocols

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
164Advanced Encryption Standard / Cipher / GOST / Feistel cipher / Linear cryptanalysis / ICE / Weak key / Symmetric-key algorithm / Serpent / Cryptography / Block ciphers / Key schedule

LNCS[removed]SEA: A Scalable Encryption Algorithm for Small Embedded Applications

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
165Linear feedback shift register / SNOW / Block cipher modes of operation / Serpent / Primitive polynomial / Q / Grain / Cryptography / Stream ciphers / SOSEMANUK

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-21 11:27:49
166Block ciphers / Block cipher / Data Encryption Standard / Block size / Initialization vector / Cipher / Symmetric-key algorithm / Key schedule / ARIA / Cryptography / Advanced Encryption Standard / Block cipher modes of operation

International Journal of Engineering Research Volume No.3, Issue No.12, pp : [removed]ISSN:[removed]online),[removed]print) 01 Dec. 2014

Add to Reading List

Source URL: www.ijer.in

Language: English - Date: 2014-11-30 09:12:30
167IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
168Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
169Keystream / Rotor machine / Cipher / Cryptanalysis / One-time pad / Block cipher / Enigma machine / Linear cryptanalysis / Differential cryptanalysis / Cryptography / Stream ciphers / Substitution cipher

Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2005-10-26 13:01:48
170Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
UPDATE