Block ciphers

Results: 398



#Item
301Differential cryptanalysis / Key schedule / Stream ciphers / Serpent / Q / Advanced Encryption Standard / ICE / Cipher / SC2000 / Cryptography / Block ciphers / Linear cryptanalysis

PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-11-09 16:59:40
302Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
303Key management / Correlation attack / Key size / Advantage / ICE / MOSQUITO / Cipher / Pseudorandom number generators / Block ciphers / Cryptography / Stream ciphers / Keystream

Correlated Keystreams in Moustique Emilia K¨ asper1 , Vincent Rijmen1,3 , Tor E. Bjørstad2 , Christian Rechberger3 ,

Add to Reading List

Source URL: www.ii.uib.no

Language: English - Date: 2008-03-07 13:01:06
304Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
305Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
306Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2004-12-30 09:37:46
307Linear feedback shift register / Keystream / Ciphertext / Block cipher / Alternating step generator / Cipher / Running key cipher / One-time pad / Correlation attack / Cryptography / Stream ciphers / Pseudorandom number generators

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
308Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
309IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2001-10-23 20:39:38
310Pseudorandomness / Pseudorandom number generators / Algorithmic information theory / Pseudorandom generator / Keystream / SEAL / Cipher / SHA-1 / Block cipher / Cryptography / Stream ciphers / Theoretical computer science

To appear in J. of Cryptology

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2008-09-21 22:35:16
UPDATE