Ciphers

Results: 800



#Item
21

Puzzling Cryptography Codes and ciphers are forms of secret communication. A code replaces letters, words, or phrases with different letters or numbers. A cipher rearranges letters or uses substitute symbols to disguise

Add to Reading List

Source URL: www.wackenhammer.com

- Date: 2017-12-04 23:43:07
    22

    Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows† Christof Beierle1 , Philipp Jovanovic2 , Martin M. Lauridsen3 , Gregor Leander1? , and Christian Rechberger3 1

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-01-05 09:31:19
      23

      Multi-Stage Fault Attacks on Block Ciphers Philipp Jovanovic, Martin Kreuzer, Ilia Polian Fakult¨at f¨ur Informatik und Mathematik Universit¨at PassauPassau, Germany {Philipp.Jovanovic, Martin.Kreuzer, Ilia.Pol

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2013-11-22 10:18:37
        24

        Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks? Micka¨el Cazorla, Kevin Marquet and Marine Minier Universit´e de Lyon, INRIA INSA-Lyon, CITI-INRIA, F-69621, Villeurbanne, France firstnam

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2013-05-17 03:36:53
          25

          On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

          Add to Reading List

          Source URL: sweet32.info

          - Date: 2016-08-23 20:02:56
            26

            Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations Andrey Bogdanov1 , Lars R. Knudsen2 , Gregor Leander2 , Francois-Xavier Standaert3 , John Steinberger4 , and Elmar Tis

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2012-01-30 04:16:33
              27

              Framework for automated cryptanalysis of authenticated ciphers Advisor(s): Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

              Add to Reading List

              Source URL: www.iaik.tugraz.at

              - Date: 2015-09-08 06:00:03
                28

                Online Ciphers from Tweakable Blockciphers Phillip Rogaway and Haibin Zhang Dept. of Computer Science, University of California, Davis, California 95616, USA {rogaway,hbzhang}@cs.ucdavis.edu Abstract. Online ciphers are

                Add to Reading List

                Source URL: web.cs.ucdavis.edu

                - Date: 2012-05-16 04:01:45
                  29Cryptography / Block ciphers / Data Encryption Standard / Substitution-permutation network / Linear cryptanalysis / Serpent / Q / Advanced Encryption Standard / ARIA / PRESENT / S-box / Stream cipher

                  ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

                  Add to Reading List

                  Source URL: www.ijmetmr.com

                  Language: English - Date: 2015-02-27 11:40:43
                  30Cryptography / Stream ciphers / Data Encryption Standard / Py / VEST / DEAL / Authenticated encryption / Institute for Applied Information Processing and Communications

                  Robustness of CAESAR candidates Advisor(s): Maria Eichlseder Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

                  Add to Reading List

                  Source URL: www.iaik.tugraz.at

                  Language: English - Date: 2015-09-08 06:00:03
                  UPDATE