Block ciphers

Results: 398



#Item
361Key management / Differential cryptanalysis / Key schedule / Boomerang attack / Weak key / Related-key attack / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 21:59:51
362Feistel cipher / Blowfish / Advanced Encryption Standard / Symmetric-key algorithm / Stream cipher / Ciphertext / ICE / Cipher / Chosen-plaintext attack / Cryptography / Block ciphers / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-28 10:30:54
363Differential cryptanalysis / SecurID / Advantage / Avalanche effect / Key schedule / Block ciphers / Khufu and Khafre / Cryptography / Advanced Encryption Standard / ICE

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-10-29 07:31:26
364Block ciphers / Stream ciphers / Cipher / LEX / Symmetric-key algorithm / Q / Cryptographic hash function / UES / XSL attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-07-22 07:06:52
365Data Encryption Standard / Advanced Encryption Standard process / Decorrelation theory / DFC / Hasty Pudding cipher / RC6 / CRYPTON / AES implementations / Serpent / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
366Advanced Encryption Standard process / National Institute of Standards and Technology / Data Encryption Standard / Feistel cipher / LOKI97 / Serpent / DFC / Hasty Pudding cipher / Q / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
367Idea NXT / Key schedule / Advanced Encryption Standard / International Data Encryption Algorithm / Linear feedback shift register / XSL attack / Cryptography / Block ciphers / Differential cryptanalysis

PDF Document

Add to Reading List

Source URL: crypto.junod.info

Language: English - Date: 2010-07-01 03:46:29
368Cryptographic hash functions / Hashing / SOBER / SHA-2 / Block cipher modes of operation / Hash function / Scream / MD5 / Linear feedback shift register / Cryptography / Stream ciphers / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-11-03 03:07:51
369RC5 / MISTY1 / Key schedule / Integral cryptanalysis / RC6 / Impossible differential cryptanalysis / Ciphertext / Boomerang attack / Differential cryptanalysis / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 10:58:11
370Mersenne twister / Advanced Encryption Standard / Linear feedback shift register / ICE / Symmetric-key algorithm / Block cipher / CryptMT / Linear congruential generator / Cryptography / Pseudorandom number generators / Stream ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-01 04:04:14
UPDATE