Ciphers

Results: 800



#Item
1Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-04-17 15:16:36
2

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
    3Cryptography / Stream ciphers / VEST / Grain / Field-programmable gate array / Altera / Xilinx / Brute-force attack / Stratix / Block cipher / Py / Data Encryption Standard

    A fundamental evaluation of 80 bit keys employed by hardware oriented stream ciphers Iain Devlin1 and Alan Purvis1 Centre for Electronic Systems, Durham University, Durham, DH1 3LH, UK {iain.devlin, alan.purvis}@durham.a

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2006-04-17 15:16:45
    4Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Block cipher / Data Encryption Standard / RC5 / Cryptanalysis / Keyword cipher / Churning / CPC Binary Barcode

    Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40
    5

    Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

    Add to Reading List

    Source URL: www.chi.uni-hannover.de

    Language: English - Date: 2014-03-07 11:05:16
      6

      Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard1⋆ , Nicolas T. Courtois2 , Jorge Nakahara Jr3⋆⋆ , Pouyan Sepehrdad3, and Bingsheng Zhang4⋆ ⋆ ⋆ 1

      Add to Reading List

      Source URL: www.gregorybard.com

      Language: English - Date: 2017-11-24 12:06:22
        7

        Stream ciphers Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 91

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        Language: English - Date: 2017-10-19 10:06:44
          8

          Software speed of stream ciphers Daniel J. Bernstein1 and Tanja Lange2 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

          Add to Reading List

          Source URL: skew2011.mat.dtu.dk

          Language: English - Date: 2011-02-07 09:17:56
            9

            Penrose Tiles To Trapdoor Ciphers

            Add to Reading List

            Source URL: www.math.tamu.edu

            - Date: 2018-02-14 18:11:12
              10

              Note on side-channel attacks and their countermeasures In the last few years ciphers making use of table-lookups in large tables—and most notably AES [12, 6]—have received a lot of bad publicity due to their vulnerab

              Add to Reading List

              Source URL: keccak.team

              Language: English - Date: 2017-08-22 12:54:56
                UPDATE