Block ciphers

Results: 398



#Item
351Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PDF Document

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:40
352Key management / Data Encryption Standard / Symmetric-key algorithm / ICE / RC5 / Substitution-permutation network / Differential cryptanalysis / Key schedule / RC6 / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-10-17 12:38:23
353Differential cryptanalysis / ICE / Linear cryptanalysis / Key schedule / Feistel cipher / International Data Encryption Algorithm / Entropy / VEST / Cryptography / Block ciphers / RC2

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
354Differential cryptanalysis / Boomerang attack / Substitution-permutation network / ICE / Q / Brute-force attack / Serpent / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
355VEST / Pseudorandom number generators / Block cipher modes of operation / Q / E0 / S-box / Linear feedback shift register / Grain / T-function / Cryptography / Stream ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-04-08 09:55:43
356Linear feedback shift register / Correlation attack / Block cipher / Py / Cipher / Keystream / Achterbahn / SOBER / Stream ciphers / Cryptography / Grain

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-08-01 07:15:22
357Idea NXT / Key schedule / Advanced Encryption Standard / International Data Encryption Algorithm / Linear feedback shift register / XSL attack / Cryptography / Block ciphers / Differential cryptanalysis

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:18
358Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-07 00:29:28
359Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / XTEA / ICE / SHACAL / International Data Encryption Algorithm / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / Cryptography / Block ciphers / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: jiqiang.googlepages.com

Language: English
360Stream ciphers / Differential cryptanalysis / MDS matrix / LEX / Grand Cru / Key schedule / Cipher / XSL attack / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-04-09 02:17:21
UPDATE