Block ciphers

Results: 398



#Item
1On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
    2Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group   Abstract. WIDEA is a family of block ciphers designed by Junod and

    Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40
    3Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

    Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

    Add to Reading List

    Source URL: www.chi.uni-hannover.de

    Language: English - Date: 2014-03-07 11:05:16
      4Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard1⋆ , Nicolas T. Courtois2 , Jorge Nakahara Jr3⋆⋆ , Pouyan Sepehrdad3, and Bingsheng Zhang4⋆ ⋆ ⋆ 1

      Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard1⋆ , Nicolas T. Courtois2 , Jorge Nakahara Jr3⋆⋆ , Pouyan Sepehrdad3, and Bingsheng Zhang4⋆ ⋆ ⋆ 1

      Add to Reading List

      Source URL: www.gregorybard.com

      Language: English - Date: 2017-11-24 12:06:22
        5Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

        Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

        Add to Reading List

        Source URL: www.cryptme.in

        Language: English - Date: 2018-07-09 04:03:14
          6Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

          Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

          Add to Reading List

          Source URL: hyperelliptic.org

          Language: English - Date: 2016-09-27 22:29:12
            7Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

            Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English - Date: 2013-09-17 06:26:54
              8     “Advanced Analysis of Block Ciphers”     

                  “Advanced Analysis of Block Ciphers”     

              Add to Reading List

              Source URL: www.science.unitn.it

              Language: Italian - Date: 2016-07-17 16:40:14
                9Lightweight Cryptography on ARM Software implementation of block ciphers and ECC Rafael Cruz, Tiago Reis, Diego F. Aranha, Julio López, Harsh Kupwade Patil University of Campinas, LG Electronics Inc.

                Lightweight Cryptography on ARM Software implementation of block ciphers and ECC Rafael Cruz, Tiago Reis, Diego F. Aranha, Julio López, Harsh Kupwade Patil University of Campinas, LG Electronics Inc.

                Add to Reading List

                Source URL: ccccspeed.win.tue.nl

                Language: English - Date: 2016-10-23 17:33:58
                  10Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋆ Ling Song1,2,3 , Zhangjie Huang1,2( ) , Qianqian Yang1,2 1  State Key Laboratory of Information Security, Institute of Informati

                  Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋆ Ling Song1,2,3 , Zhangjie Huang1,2( ) , Qianqian Yang1,2 1 State Key Laboratory of Information Security, Institute of Informati

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2017-07-03 21:45:35