COSIC

Results: 193



#Item
141University of Cambridge Computer Laboratory / Key schedule / Linear cryptanalysis / Block cipher / Grain / ICE / Advanced Encryption Standard / Cipher / Churning / Cryptography / Stream ciphers / Tiny Encryption Algorithm

A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-14 05:03:01
142NESSIE / Nimbus / SOBER / Hierocrypt / Grand Cru / NOEKEON / SHACAL / LEVIATHAN / SNOW / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2002-02-14 11:40:18
143NESSIE / Nimbus / SOBER / Hierocrypt / SNOW / Cryptographic hash function / SAFER / LEVIATHAN / Grand Cru / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 17:39:27
144Cryptography standards / NESSIE / MISTY1 / KHAZAD / SHA-2 / Katholieke Universiteit Leuven / SHACAL / Leuven / Whirlpool / Cryptography / Block ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2005-06-13 10:26:02
145Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / MARS / Twofish / Differential cryptanalysis / NESSIE / Q / Outline of cryptography / Cryptography / Advanced Encryption Standard / Block ciphers

NESSIE Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2001-02-26 10:10:48
146Open formats / Publishing / LaTeX / TeX / BibTeX / PdfTeX / Device independent file format / Portable Document Format / ConTeXt / Computing / Application software / Computer file formats

Example for WEWoRC 2007 Christopher Wolf ESAT-COSIC, K.U. Leuven, Belgium http://www.esat.kuleuven.be/cosic/ [removed] or [removed]

Add to Reading List

Source URL: 2007.weworc.org

Language: English - Date: 2007-01-20 11:48:48
147Symmetric-key algorithm / NESSIE / SOBER / Cryptographic hash function / Anubis / Grand Cru / Hierocrypt / Nimbus / Cipher / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 18:26:12
148Information privacy / Internet privacy / Consumer privacy / Data Protection Directive / Medical privacy / Personally identifiable information / Data security / Privacy policy / Information privacy law / Privacy / Ethics / FTC Fair Information Practice

Engineering Privacy by Design Seda G¨ urses, Carmela Troncoso, and Claudia Diaz

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
149Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
150XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE