Block ciphers

Results: 398



#Item
221CRYPTREC / NESSIE / Cryptosystem / Hierocrypt / SC2000 / Cryptographic hash function / CIPHERUNICORN-A / CIPHERUNICORN-E / Symmetric-key algorithm / Cryptography / Cryptography standards / Block ciphers

CRYPTREC[removed]CRYPTREC Report[removed]Provisional Translation) March 2001

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:25
222Hierocrypt / MDS matrix / ICE / Advanced Encryption Standard / Feistel cipher / Matrix / Circulant matrix / Key schedule / Function / Cryptography / Mathematics / Block ciphers

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
223ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

PDF Document

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-09-25 21:04:44
224NOEKEON / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / GOST / VEST / Q / Skipjack / ICE / Cryptography / Block ciphers / Stream ciphers

PDF Document

Add to Reading List

Source URL: www.smartsantander.eu

Language: English - Date: 2012-09-27 06:47:34
225Key schedule / ICE / Advantage / Skein / International Data Encryption Algorithm / Crypt / Cryptography / Block ciphers / Boomerang attack

SHA-3 Conference, March 2012, A Study of practical-time distinguishing attacks against round-reduced Threefish-256

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:00:24
226Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
227Data Encryption Standard / VEST / UES / Cryptography / Message authentication codes / Block ciphers

Comments on the security of RMAC as proposed in NIST Draft 800-38B

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:19:00
228Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
229Cube attack / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Trivium / Block cipher / Chosen-plaintext attack / Cipher / Cryptography / Espionage / Stream ciphers

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
230Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
UPDATE