Ciphers

Results: 800



#Item
351Key size / Advanced Encryption Standard / Advantage / Symmetric-key algorithm / Stream cipher / Format-preserving encryption / Cipher / ARIA / ICE / Cryptography / Block ciphers / Key management

The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 14:55:09
352Linear feedback shift register / NLFSR / Trivium / Keystream / State space / Stream ciphers / Cryptography / Grain

Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks Muhammed F. Esgin1,2 and Orhun Kara1 ¨ ITAK ˙ ˙

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 09:15:34
353Randomness / Key management / Fortuna / ISAAC / Linear congruential generator / Cryptographic hash function / Random number generation / Mersenne twister / Advanced Encryption Standard / Cryptography / Pseudorandom number generators / Stream ciphers

Parallel Random Numbers: As Easy as 1, 2, 3 ∗ ∗† John K. Salmon, Mark A. Moraes, Ron O. Dror, and David E. Shaw

Add to Reading List

Source URL: www.thesalmons.org

Language: English - Date: 2011-10-02 11:06:07
354Differential cryptanalysis / ICE / Boomerang attack / International Data Encryption Algorithm / Differential-linear attack / Data Encryption Standard / Cryptography / Block ciphers / Linear cryptanalysis

Improved Linear Trails for the Block Cipher Simon Tomer Ashur ESAT/COSIC KU Leuven and iMinds Leuven, Belgium tomer.ashur @ esat.kuleuven.be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 14:24:24
355Rijndael S-box / Block size / S-box / Data Encryption Standard / ARIA / Padding / Rijndael key schedule / Format-preserving encryption / Cryptography / Advanced Encryption Standard / Block ciphers

InSight: RIVIER ACADEMIC JOURNAL, VOLUME 6, NUMBER 2, FALL[removed]ADVANCED ENCRYPTION STANDARD Douglas Selent* Student, M.S. Program in Computer Science, Rivier College Abstract

Add to Reading List

Source URL: www.rivier.edu

Language: English - Date: 2010-11-24 19:07:40
356Secure communication / Internet protocols / RC4 / Transport Layer Security / Weak key / Distinguishing attack / Related-key attack / Cipher suite / Cryptanalysis / Cryptography / Cryptographic protocols / Stream ciphers

Hacker Intelligence Initiative Attacking SSL when using RC4 Breaking SSL with a 13-year-old RC4 Weakness Abstract

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2015-03-25 21:58:39
357Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
358Feistel cipher / Cipher / Linear cryptanalysis / Cryptanalysis / Block ciphers / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Q

On the need to consider multipath characteristics AES∗ : A Luby-Rackoff-like approach for the SPN of AES Simplifying the LP computation for AES∗ Towards the True Random Cipher Further Results

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
359Cipher / Block cipher / Advanced Encryption Standard / KFB mode / VEST / Cryptography / Stream ciphers / Keystream

ECRYPT Network of Excellence in Cryptology DOES THE WORLD NEED NEW STREAM CIPHERS? STEVE BABBAGE, VODAFONE 12TH AUGUST 2004

Add to Reading List

Source URL: srtp.sourceforge.net

Language: English - Date: 2004-08-16 14:34:48
360

CS255: Winter 2009 PRPs and PRFs 1. Abstract ciphers:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-25 22:18:32
    UPDATE