Ciphers

Results: 800



#Item
121

Differential Power Analysis of Stream Ciphers Wieland Fischer, Berndt M. Gammel, Oliver Kniffler, Joachim Velten Infineon Technologies AG, Germany Oliver.Kniffler@i

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:30:10
    122

    On periods of Edon-(2m, 2k) Family of Stream Ciphers Danilo Gligoroski1,2 , Smile Markovski2 , and Svein Johan Knapskog1 1 Centre for Quantifiable Quality of Service in Communication Systems, Norwegian

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2006-02-13 07:41:32
      123

      NEOCLASSICAL CRYPTOGRAPHIC SYSTEMS by Clayton Pierce Clayton Pierce ( ACA Nom: SI SI) has written an extensive handbook detailing the construction of the classical ciphers and developing a cipher classification scheme.

      Add to Reading List

      Source URL: www.und.nodak.edu

      - Date: 2004-12-07 11:57:35
        124

        Simple Cipher Messages ~ 1 Cryptology Ciphers are used to make the contents of a message secret, so that it cannot be read by anyone who for whom it is not intended. There many ways of doing this, varying from the extre

        Add to Reading List

        Source URL: www.cleavebooks.co.uk

        Language: English - Date: 2007-05-13 18:30:22
          125

          Which phase-3 eSTREAM ciphers provide the best software speeds? Daniel J. Bernstein ?

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2008-03-31 14:47:54
            126

            Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy? Gautham Sekar, Souradyuti Paul, and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10,

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2007-03-15 14:18:40
              127

              Addition Ciphers ~ 1 Cryptology Nowadays, most ciphers are based on numbers rather than letters. There are different reasons for this, but mainly it is done so that various arithmetic operations can be carried out on

              Add to Reading List

              Source URL: www.cleavebooks.co.uk

              Language: English - Date: 2007-05-13 18:30:24
                128

                The Probability Advantages of Two Linear Expressions in Symmetric Ciphers∗ Haina Zhang †

                Add to Reading List

                Source URL: www.ecrypt.eu.org

                Language: English - Date: 2006-08-03 12:08:06
                  129

                  Statistical Analysis of Synchronous Stream Ciphers Meltem S¨ onmez Turan, Ali Do˘ganaksoy, C ¸ a˘gda¸s C ¸ alık

                  Add to Reading List

                  Source URL: www.ecrypt.eu.org

                  Language: English - Date: 2006-02-13 07:41:31
                    130

                    New Birthday Attacks on Some MACs Based on Block Ciphers New Birthday Attacks on Some MACs Based on Block Ciphers Wei Wang Joint work with Zheng Yuan, Keting Jia, Guangwu Xu, and

                    Add to Reading List

                    Source URL: www.iacr.org

                    Language: English - Date: 2009-08-17 00:42:08
                      UPDATE