Ciphers

Results: 800



#Item
251Linear cryptanalysis / Key schedule / Advanced Encryption Standard / Block ciphers / MacGuffin / Differential-linear attack / Cryptography / Differential cryptanalysis / ICE

Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 22:05:20
252Slide attack / ICE / Linear cryptanalysis / Symmetric-key algorithm / SEED / Related-key attack / Block ciphers / Weak key / Data Encryption Standard / Cryptography / Key schedule / Differential cryptanalysis

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
253ESTREAM / Salsa20 / Field-programmable gate array / Trivium / Grain / Throughput / LEX / MICKEY / A5/1 / Stream ciphers / Cryptography / Phelix

Comparison of hardware performance of selected Phase II eSTREAM candidates Kris Gaj, Gabriel Southern, and Ramakrishna Bachimanchi ECE Department George Mason University Abstract

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:32:08
254Key schedule / Py / Cipher / ICE / RC4 / Cryptography / Stream ciphers / Block cipher

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-03 23:50:29
255Key generation / Block ciphers / Disk encryption / Block cipher modes of operation / Cryptography / SEED / Key Wrap

SEED Algorithm Object Identifiers. SEED Algorithm Object Identifiers

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
256Stream ciphers / Unix / RC4 / POSIX / Fluhrer /  Mantin and Shamir attack / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Randomness

OpenBSD: Where crypto is heading? Mike Belopuhov .vantronix secure systems Moscow, December

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2013-12-16 07:37:43
257

Block Ciphers based on Algebraic structure and its Hardware Implementation

Add to Reading List

Source URL: www.centrum.bezpieczenstwa.pl

Language: Polish - Date: 2012-07-08 14:41:06
    258Finite fields / Rijndael S-box / Q / Square / Key schedule / Serpent / Cryptography / Advanced Encryption Standard / Block ciphers

    Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs Francois-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat UCL Crypto Group

    Add to Reading List

    Source URL: www.intopix.com

    Language: English - Date: 2007-11-14 11:05:56
    259Reconfigurable computing / Field-programmable gate array / Block ciphers / AES implementations / DEAL / Xilinx / LEX / Advanced Encryption Standard process / CRYPTON / Cryptography / Advanced Encryption Standard / Data Encryption Standard

    Contents I Compact and Efficient Encryption/Decryption Module Implementation of AES I.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .

    Add to Reading List

    Source URL: www.intopix.com

    Language: English - Date: 2007-11-14 11:11:18
    260Michael Reiter / Computable function / Carnegie Mellon University / VEST / Ciphertext / RSA / Cryptographic hash function / Cryptography / Public-key cryptography / Stream ciphers

    Microsoft PowerPoint - SecurityOverview

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-01-27 11:55:21
    UPDATE