Block ciphers

Results: 398



#Item
291Block ciphers / Stream ciphers / IAPM / Block cipher / Authenticated encryption / UMAC / CBC-MAC / Pseudorandom number generator / Index of cryptography articles / Cryptography / Message authentication codes / Block cipher modes of operation

Encryption Modes with Almost Free Message Integrity Charanjit S. Jutla

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-11-24 19:35:04
292Block ciphers / Public-key cryptography / Outline of cryptography / Index of cryptography articles / Cryptography / Cryptography standards / CRYPTREC

CRYPTREC[removed]CRYPTREC Report 2002

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
293IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]  

Add to Reading List

Source URL: WWW.isaac.cs.berkeley.edu

Language: English - Date: 2001-08-01 17:50:14
294Caesar cipher / Cipher / Crypt / International Data Encryption Algorithm / Advanced Encryption Standard / Encryption / GNU Privacy Guard / SAFER / Cryptography / Block ciphers / ROT13

On the 2ROT13 Encryption Algorithm ak, #mum cryptolabs April 1, 2005

Add to Reading List

Source URL: phoenix.clifford.at

Language: English - Date: 2005-04-01 02:29:25
295Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
296Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
297LEX / Block cipher / Differential cryptanalysis / Trivium / Cryptography / Stream ciphers / Advanced Encryption Standard

A New Attack on the LEX Stream Cipher Orr Dunkelman1,⋆ and Nathan Keller2,⋆⋆ ´

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2009-11-22 09:08:02
298Advanced Encryption Standard / Data Encryption Standard / LEX / UES / Py / AES implementations / VEST / ARIA / Q / Cryptography / Stream ciphers / Block ciphers

A New 128-bit Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-13 11:02:24
299Block cipher / LEX / Key schedule / VEST / ARIA / QUAD / XSL attack / Grain / Cryptography / Stream ciphers / Advanced Encryption Standard

Algebraic Cryptanalysis of a Small-Scale Version of Stream Cipher LEX Vesselin Velichkov

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
300Block ciphers / Serpent / Preimage attack / Cryptography / Cryptographic hash functions / NIST hash function competition

The Hash Function Hamsi ¨ ul K¨ Ozg¨

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE