Block ciphers

Results: 398



#Item
31

ASK 2012 Nagoya, Japan Recent Meet-in-the-Middle Attacks on Block Ciphers Takanori Isobe

Add to Reading List

Source URL: web.spms.ntu.edu.sg

Language: English - Date: 2012-08-30 22:11:14
    32

    Stream Ciphers and Block Ciphers Guest Lecture for 2WC12 Cryptography I - Fall 2011 Ruben Niederhagen December 2nd, 2011

    Add to Reading List

    Source URL: polycephaly.org

    Language: English - Date: 2013-05-10 00:59:35
      33Cryptography / Stream ciphers / Cryptographic protocols / RC4 / Internet Standards / Computer network security / Transport Layer Security / Block cipher mode of operation / Keystream / Wi-Fi Protected Access / E0 / Symmetric-key algorithm

      A preliminary version of this paper appears in the proceedings of the USENIX Security SymposiumThis is the full version. On the Security of RC4 in TLS and WPA∗ Nadhem J. AlFardan1 Daniel J. Bernstein2

      Add to Reading List

      Source URL: tls.mbed.org

      Language: English
      34Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

      IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

      Add to Reading List

      Source URL: euler.ecs.umass.edu

      Language: English - Date: 2014-03-28 15:45:17
      35

      The Simeck Family of Lightweight Block Ciphers Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo, Ontario, N2L 3G1,

      Add to Reading List

      Source URL: cacr.uwaterloo.ca

      Language: English - Date: 2015-06-21 16:34:26
        36

        The Simeck Family of Lightweight Block Ciphers Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, and Guang Gong Electrical and Computer Engineering, University of Waterloo Sept 15, 2015

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          37Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

          Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

          Add to Reading List

          Source URL: pub.ist.ac.at

          Language: English - Date: 2014-06-19 16:51:50
          38

          Design and Security Evaluation of Lightweight Block Ciphers Hadi Soleimany Shahid Beheshti University SeptemberISCISC 2015)

          Add to Reading List

          Source URL: iscisc2015.guilan.ac.ir

          Language: English - Date: 2015-11-26 00:39:28
            39

            Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures Lejla Batina, Amitabh Das, Barış Ege, Elif Bilge Kavun, Nele Mentens,

            Add to Reading List

            Source URL: rfidsec2013.iaik.tugraz.at

            Language: English - Date: 2013-08-02 05:37:17
              40

              Introduction Early Applications to Block Ciphers Preimages of Hash Functions

              Add to Reading List

              Source URL: web.spms.ntu.edu.sg

              Language: English - Date: 2012-08-26 19:26:44
                UPDATE