<--- Back to Details
First PageDocument Content
Differential cryptanalysis / Blowfish / SAFER / ICE / Key schedule / Linear cryptanalysis / SXAL/MBAL / Q / S-box / Cryptography / Block ciphers / SHARK
Differential cryptanalysis
Blowfish
SAFER
ICE
Key schedule
Linear cryptanalysis
SXAL/MBAL
Q
S-box
Cryptography
Block ciphers
SHARK

1 The Cipher SHARK

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Download Document from Source Website

File Size: 164,80 KB

Share Document on Facebook

Similar Documents

Key management / SAFER / Padding / Slide attack / Weak key / Key schedule / Crypt / ICE / SXAL/MBAL / Cryptography / Block ciphers / Advanced Encryption Standard

Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†

DocID: 13DdF - View Document

Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

DocID: 13m9A - View Document

Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

DocID: 13iyT - View Document

Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

DocID: 3N3Z - View Document

Differential cryptanalysis / Blowfish / SAFER / ICE / Key schedule / Linear cryptanalysis / SXAL/MBAL / Q / S-box / Cryptography / Block ciphers / SHARK

1 The Cipher SHARK

DocID: 2LEG - View Document