Ciphers

Results: 800



#Item
311Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
312Advanced Encryption Standard / Ciphertext / Stream ciphers

Differential Fault Analysis on the AES Key Schedule Junko TAKAHASHI and Toshinori FUKUNAGA NTT Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corporation, {takahashi.junko, fukunaga.toshinori}@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-27 04:55:53
313Keystream / Maths24 / Games / COMPASS/Sample Code / Stream ciphers / Mega Man X / Correlation attack

Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1 Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-29 01:05:15
314MICKEY / A5/1 / ESTREAM / Keystream / Cipher / Block cipher / Py / VEST / Trivium / Stream ciphers / Cryptography / Grain

Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1T.E. Bjørstad The Selmer Center, Department of Informatics,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-02-26 08:39:55
315Camellia / SAFER / RC6 / Feistel cipher / Key schedule / ICE / Cipher / Data Encryption Standard / Index of cryptography articles / Cryptography / Block ciphers / Hierocrypt

I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 08:53:09
316Stream ciphers / Abstract algebra / Linear algebra / Cryptographic hash functions / Linear cryptanalysis / ICE / VEST / Q / Grain / Cryptography / Algebra / Mathematics

Higher-order cryptanalysis of LowMC Christoph Dobraunig, Maria Eichlseder, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. LowMC is a family of block ciphers dev

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 15:22:15
317Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29
318Salsa20 / LEX / Trivium / MICKEY / VEST / SOSEMANUK / Grain / Dragon / Phelix / Stream ciphers / Cryptography / ESTREAM

Hardware evaluation of eSTREAM Candidates: Grain, Lex, Mickey128, Salsa20 and Trivium Marcin Rogawski PROKOM Software S.A. Warsaw, Grójecka 127

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:31:58
319Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
320Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
UPDATE