Ciphers

Results: 800



#Item
101Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:16
102

Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results? Benoit Cogliati?? , Jacques Patarin? ? ? , and Yannick Seurin† July 25, 2014 Abstract. Security amplification results for blo

Add to Reading List

Source URL: www.prism.uvsq.fr

Language: English - Date: 2015-04-03 07:32:23
    103Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

    Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:32
    104

    Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers Mario Lamberger, Institute for Applied Information Processing and Communication, TU Graz Joint work with Joan Daemen, Nor

    Add to Reading List

    Source URL: www.math.tugraz.at

    Language: English - Date: 2008-07-29 07:57:21
      105

      Reflection Cryptanalysis of PRINCE-like Ciphers Hadi Soleimany1 , C´eline Blondeau1 , Xiaoli Yu2,3 , Wenling Wu2 , Kaisa Nyberg1 , Huiling Zhang2 , Lei Zhang2 , and Yanfeng Wang2 1

      Add to Reading List

      Source URL: research.ics.aalto.fi

      Language: English - Date: 2014-12-19 14:51:35
        106

        Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

        Add to Reading List

        Source URL: www.dcsec.uni-hannover.de

        Language: English - Date: 2014-03-07 11:05:16
          107

          Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

          Add to Reading List

          Source URL: users.ics.aalto.fi

          Language: English - Date: 2014-06-24 08:03:50
            108Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

            PDF Document

            Add to Reading List

            Source URL: jda.noekeon.org

            Language: English - Date: 2013-08-28 07:53:28
            109Cryptography / Block ciphers / Advanced Encryption Standard / Vincent Rijmen / Symmetric-key algorithm / Joan Daemen / Data Encryption Standard / Key schedule / Q / ARIA / Cipher / Serpent

            PDF Document

            Add to Reading List

            Source URL: jda.noekeon.org

            Language: English - Date: 2013-09-20 15:54:41
            110

            Block Ciphers „ Introduction

            Add to Reading List

            Source URL: www.cs.haifa.ac.il

            Language: English - Date: 2013-02-21 09:12:37
              UPDATE