Block ciphers

Results: 398



#Item
81Serpent / ARIA / Q / Key schedule / Cipher / Block size / Twofish / RC6 / Format-preserving encryption / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-05-01 12:15:32
82Cipher / Cryptanalysis / Symmetric-key algorithm / RC4 / Encryption software / Index of cryptography articles / Differential cryptanalysis / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
83Differential cryptanalysis / Block cipher modes of operation / A5/1 / RSA / Padding / Keystream / Block cipher / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
84Feistel cipher / Combinatorics / ICE / ARIA / Permutations / Data Encryption Standard / Format-preserving encryption / Cryptography / Block ciphers / Mathematics

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
85Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
86Block ciphers / Skipjack / Clipper chip / Cryptographic software / Capstone / Key escrow / Cipher / Public-key cryptography / Key / Cryptography / Key management / National Security Agency

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-11-03 20:44:47
87Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
88Keystream / Block cipher modes of operation / Transport Layer Security / Py / Tiny Encryption Algorithm / Ciphertext / Padding / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / RC4

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
89Block ciphers / Reconfigurable computing / AES implementations / DEAL / Field-programmable gate array / LEX / Xilinx / KHAZAD / Cryptography / Advanced Encryption Standard / Data Encryption Standard

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:09:55
90Linear cryptanalysis / Key schedule / Advanced Encryption Standard / Block ciphers / MacGuffin / Differential-linear attack / Cryptography / Differential cryptanalysis / ICE

Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 22:05:20
UPDATE