Blowfish

Results: 54



#Item
11ICE / Ciphertext / Stream cipher / Chosen-plaintext attack / Blowfish / Cryptanalysis / Linear cryptanalysis / Cipher / Symmetric-key algorithm / Cryptography / Block cipher / Differential cryptanalysis

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
12Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
13Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
14Blowfish / Advanced Encryption Standard / MacGuffin / Feistel cipher / ICE / Lucifer / SAFER / S-box / Khufu and Khafre / Cryptography / Block ciphers / Twofish

Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
15Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
16Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
17Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
18Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of AsiacryptXuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 09:18:30
19Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29
20Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
UPDATE