Block cipher

Results: 1020



#Item
1

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: www.cryptme.in

Language: English - Date: 2018-07-09 04:03:14
    2

    Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

    Add to Reading List

    Source URL: skew2011.mat.dtu.dk

    Language: English - Date: 2011-02-07 09:16:03
      3

      Improved Linear Cryptanalysis of SMS4 Block Cipher

      Add to Reading List

      Source URL: skew2011.mat.dtu.dk

      Language: English - Date: 2011-02-17 05:38:50
        4

        An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-07-17 05:04:16
          5Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

          AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2015-02-21 21:04:37
          6Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

          Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Add to Reading List

          Source URL: cs.tau.ac.il

          Language: English - Date: 2009-06-25 15:56:23
          7Cryptography / Authenticated encryption / Symmetric-key cryptography / Block cipher / Random oracle / RSA / Advantage / Encryption / Public-key cryptography

          PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-25 00:46:55
          8Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

          An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2007-08-20 03:23:28
          9Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles

          ¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

          Add to Reading List

          Source URL: issac2009.kias.re.kr

          Language: English - Date: 2009-07-28 12:02:47
          10Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

          LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

          Add to Reading List

          Source URL: events.iaik.tugraz.at

          Language: English - Date: 2006-07-05 11:52:34
          UPDATE