Block ciphers

Results: 398



#Item
231Cipher / Symmetric-key algorithm / UES / NTRU / Key size / Q / Cryptography / Block ciphers / Elliptic curve cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:52:01
232ECRYPT / VEST / Block cipher / CRYPTON / Cipher / LEX / Cryptographic hash function / Data Encryption Standard / Crypto++ / Cryptography / Stream ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:35:07
233Keystream / Block cipher / A5/1 / Symmetric-key algorithm / Salsa20 / Caesar cipher / Substitution cipher / RC4 / Cryptography / Stream ciphers / Cipher

Analysis of Lightweight Stream Ciphers PhD public defense Simon Fischer EPFL and FHNW April 18th 2008

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-04-17 18:36:42
234Substitution-permutation network / ICE / Linear cryptanalysis / Differential cryptanalysis / S-box / Lucifer / Q / Canonical form / Data Encryption Standard / Cryptography / Block ciphers / Permutations

Cryptographic Analysis of All 4 × 4-Bit S-Boxes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
235Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
236Block ciphers / Project 25 / Advanced Encryption Standard / Key size / Cipher / UES / NSA encryption systems / Cryptography / Key management / Data Encryption Standard

Application Note Using the IFR 2975 for Advanced Project 25 Keyloading Capabilities and AES/DES Encryption by Rob Barden

Add to Reading List

Source URL: www.p25.com

Language: English - Date: 2012-12-07 14:19:20
237Trivium / ICE / Initialization vector / VEST / Weak key / Block cipher / Symmetric-key algorithm / Cryptography / Stream ciphers / Grain

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Simon Fischer1 , Shahram Khazaei2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 07:55:04
238SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
239Keystream / A5/1 / Block cipher / Linear feedback shift register / One-time pad / Cryptography / Stream ciphers / Cipher

Introduction to cryptography Ragni Ryvold Arnesen [removed] Norsk Regnesentral

Add to Reading List

Source URL: publications.nr.no

Language: English - Date: 2011-02-11 06:14:51
240SOBER / SAFER / SHACAL / Cryptographic hash function / Q / MISTY1 / SHA-2 / Whirlpool / Camellia / Cryptography / Block ciphers / NESSIE

Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 15:34:08
UPDATE