Block ciphers

Results: 398



#Item
41

Stream Ciphers and Block Ciphers Cryptography I – Fall 2013 Ruben Niederhagen September 19th, 2013

Add to Reading List

Source URL: polycephaly.org

Language: English - Date: 2014-04-30 06:43:42
    42Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-06-19 17:26:59
    43Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

    The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-29 16:18:56
    44

    School on Block Ciphers and Physical Security of Crypto Devices – Joint ECRYPT II SymLab and VAMPIRE summer school, targeting PhD students, post-docs, and young researchers in general

    Add to Reading List

    Source URL: fse2011.mat.dtu.dk

    - Date: 2011-03-01 04:41:16
      45Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

      Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

      Add to Reading List

      Source URL: www.rocq.inria.fr

      Language: English - Date: 2006-03-23 08:13:04
      46

      Known and Chosen Key Differential Distinguishers for Block Ciphers Josef Pieprzyk joint work with Ivica Nikoli´c, Przemyslaw Sokolowski, and Ron Steinfeld

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English
        47

        Implementing Lightweight Block Ciphers on x86 Architectures

        Add to Reading List

        Source URL: www.infosec.sdu.edu.cn

        Language: English - Date: 2015-09-17 19:41:22
          48

          Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨ oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-03-31 11:56:02
            49Stream ciphers / Block ciphers / KeeLoq / Data Encryption Standard / Tiny Encryption Algorithm / A5/1 / Key schedule / Slide attack / Nonlinear feedback shift register / ICE

            KeeLoq Robert R. Enderlein School of Computer and Communication Sciences Semester Project

            Add to Reading List

            Source URL: www.e7n.ch

            Language: English
            50Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

            Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

            Add to Reading List

            Source URL: jda.noekeon.org

            Language: English - Date: 2013-08-28 07:53:16
            UPDATE