Ciphers

Results: 800



#Item
381NIST hash function competition / Cross-platform software / Search algorithms / Stream ciphers / X86-64 / Pointer / Joan Daemen / Hash function / LEX / Computer architecture / Computing / Keccak

The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:25:54
382Eating disorders / Anxiety disorders / Phobias / Culture-bound syndromes / Binge eating disorder / Bulimia nervosa / Obsessive–compulsive disorder / Social anxiety disorder / Anxiety / Psychiatry / Abnormal psychology / Clinical psychology

Codes and Ciphers Booklist

Add to Reading List

Source URL: www.essex.gov.uk

Language: English - Date: 2015-01-27 04:30:45
383

Codes and Ciphers Booklist

Add to Reading List

Source URL: www.essex.gov.uk

- Date: 2015-01-27 04:30:46
    384Grille / Caesar cipher / Substitution cipher / Classical cipher / Cryptography / Cipher / Code

    Caesar’s Ciphers: Ms.Danielson _http://shodor.org/interactivate/activities/CaesarCipher/_ The History of Ciphers[removed]From: http://www.cs.usask.ca/content/resources/csconcepts/1999_3/lessons/L1/History.html). _Crypto

    Add to Reading List

    Source URL: www.cobblearning.net

    Language: English - Date: 2011-10-01 09:06:00
    385Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

    A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-15 14:18:24
    386Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

    FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2006-03-10 16:40:02
    387Stream ciphers / Pseudorandom number generators / Feedback with Carry Shift Registers / F-FCSR / Field theory / Error detection and correction / Linear feedback shift register / P-adic number / Berlekamp–Massey algorithm / Mathematics / Cryptography / Abstract algebra

    F-FCSR: design of a new class of stream ciphers Fran¸cois Arnault and Thierry P. Berger [removed] [removed]

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2008-09-15 00:54:53
    388

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading Peter Gaˇ zi

    Add to Reading List

    Source URL: www.iacr.org

    - Date: 2012-04-20 07:04:20
      389Keystream / RC4 / Stream ciphers / Cryptography / Py

      17th March[removed]FSE 2006 Email: [removed]

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2006-04-18 10:40:57
      390RC4 / Distinguishing attack / Py / Permutation / Weak key / Related-key attack / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

      Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel [removed]

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2005-03-18 09:06:03
      UPDATE