Block cipher

Results: 1020



#Item
1Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Add to Reading List

Source URL: www.cryptme.in

Language: English - Date: 2018-07-09 04:03:14
    2Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

    Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

    Add to Reading List

    Source URL: skew2011.mat.dtu.dk

    Language: English - Date: 2011-02-07 09:16:03
      3Improved Linear Cryptanalysis of SMS4 Block Cipher

      Improved Linear Cryptanalysis of SMS4 Block Cipher

      Add to Reading List

      Source URL: skew2011.mat.dtu.dk

      Language: English - Date: 2011-02-17 05:38:50
        4An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

        An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-07-17 05:04:16
          5AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

          AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2015-02-21 21:04:37
          6Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

          Add to Reading List

          Source URL: cs.tau.ac.il

          Language: English - Date: 2009-06-25 15:56:23
          7PPAE: Practical Parazoa Authenticated Encryption Family  PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          PPAE: Practical Parazoa Authenticated Encryption Family PPAE: Practical Parazoa Authenticated Encryption Family Donghoon Chang2 Sumesh Manjunath R1 Somitra Kumar Sanadhya2

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-25 00:46:55
          8An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

          An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

          Add to Reading List

          Source URL: web.cs.ucdavis.edu

          Language: English - Date: 2007-08-20 03:23:28
          9¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology  `

          ¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

          Add to Reading List

          Source URL: issac2009.kias.re.kr

          Language: English - Date: 2009-07-28 12:02:47
          10LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

          LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

          Add to Reading List

          Source URL: events.iaik.tugraz.at

          Language: English - Date: 2006-07-05 11:52:34