Block ciphers

Results: 398



#Item
211CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
212CRYPTREC / NESSIE / Hierocrypt / SC2000 / Cryptosystem / CIPHERUNICORN-A / CIPHERUNICORN-E / Public-key cryptography / Camellia / Cryptography / Cryptography standards / Block ciphers

CRYPTREC[removed]CRYPTREC Report 2001 March 2002 Information-technology Promotion Agency, Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
213Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
214Ciphertext / Cipher / Cryptanalysis / Block cipher / A5/1 / Key size / Keystream / Multiple encryption / Unicity distance / Cryptography / Stream ciphers / Key management

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security David A. McGrew and Scott R. Fluhrer mcgrew, sfluhrer  @cisco.com Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2002-11-21 18:03:36
215Cryptographic hash functions / CRYPTREC / Key management / Pseudorandom number generators / Symmetric-key algorithm / Hierocrypt / Stream cipher / Key size / SHA-2 / Cryptography / Cryptography standards / Block ciphers

Report on Evaluation of Symmetric-Key Cryptographic Techniques May 22, 2003 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
216Symmetric-key algorithm / Block ciphers / Stream ciphers / Outline of cryptography / Cryptography / CRYPTREC / Cipher

Role of Cryptographic Evaluations in e-Japan Strategy January 28, 2002 Hidetoshi Ono, Director, Office of IT Security Policy, Ministry of Economy, Trade and Industry

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
217CRYPTREC / Hierocrypt / Symmetric-key algorithm / ABC / Cryptographic hash function / SC2000 / Q / Cipher / CIPHERUNICORN-A / Cryptography / Block ciphers / Stream ciphers

CRYPTREC2001 Report on Present State of Symmetric-Key Cipher Evaluations January 28, 2002 Toshinobu Kaneko

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
218MUGI / Block cipher / Panama / Symmetric-key algorithm / Cipher / CRYPTREC / Cryptography / Stream ciphers / MULTI-S01

Report on Present State of MUGI Cipher Evaluation (screening evaluation) January 28, 2002 Kouichi Sakurai Member,

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
219MULTI-S01 / CRYPTREC / Block cipher modes of operation / Symmetric-key algorithm / Cryptographic hash function / Cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Stream ciphers / Finite fields

Report on Present State of MULTI-S01 Cipher Evaluation (full evaluation) January 28, 2002 Takeshi Shimoyama,Yukiyasu Tsunoo, Kiyomichi Araki, Members

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
220Post-quantum cryptography / XSL attack / Key schedule / QUAD / Block cipher / Hidden Field Equations / Differential cryptanalysis / Q / Cipher / Cryptography / Advanced Encryption Standard / Stream ciphers

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
UPDATE