<--- Back to Details
First PageDocument Content
Block cipher / Cryptanalysis / Feistel cipher / Key schedule / Tiny Encryption Algorithm / Index of cryptography articles / Encryption by date / Cryptography / CIPHERUNICORN-A / CIPHERUNICORN-E
Date: 2013-06-03 22:32:58
Block cipher
Cryptanalysis
Feistel cipher
Key schedule
Tiny Encryption Algorithm
Index of cryptography articles
Encryption by date
Cryptography
CIPHERUNICORN-A
CIPHERUNICORN-E

A Cryptographic Review of Cipherunicorn-E

Add to Reading List

Source URL: www.ipa.go.jp

Download Document from Source Website

File Size: 274,96 KB

Share Document on Facebook

Similar Documents

Cryptography / Taxation in the United States / Social Security / Universal identifiers / Social Security number / Encryption / Computer security

Protection of SSNs Procedure Effective Date: Purpose: This procedure will ensure the protection and confidentiality of Social Security Numbers used by the Department of Labor and Industry (DLI). This procedure

DocID: 1psuo - View Document

Block cipher / Q / Finite fields / XSL attack / Encryption by date / Cryptography / Advanced Encryption Standard / Polynomial

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

DocID: 13dD9 - View Document

Secure communication / Data Encryption Standard / Cryptographic protocols / Secure Shell / Transport Layer Security / Wireless security / Key size / Telnet / Advanced Encryption Standard / Cryptography / Internet standards / Internet protocols

DRAFT Standard Statement – Encryption Title: Encryption Standard Document Number: SS[removed]Effective Date: xx/xx/2011 Published by: Department of Information Systems 1. Purpose

DocID: GcI3 - View Document

Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

DocID: iFLx - View Document

SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

DocID: enA6 - View Document