Ciphers

Results: 800



#Item
41Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:42
42Cryptography / Applied mathematics / Stream ciphers / Public-key cryptography / E-commerce / RSA / Cryptanalysis / Vigenre cipher / Block cipher / Cipher / Hill cipher / Finite field

Final Topicsand 5440 students cover the same material, but 5440 students may find slightly more emphasis on their midterm on definitions, proofs and logical deductions instead of algorithms and computations. With

Add to Reading List

Source URL: math.colorado.edu

Language: English - Date: 2015-10-18 16:52:38
43Stream ciphers / Data Encryption Standard / Message authentication codes / Cryptography / VEST / Authenticated encryption / Py / DEAL / Index of cryptography articles

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
44Stream ciphers / Nonlinear feedback shift register / Radio-frequency identification / De Bruijn sequence / De Bruijn / Linear-feedback shift register / Nicolaas Govert de Bruijn / Nonlinear system

The Search and Construction of Nonlinear Feedback Shift Registers

Add to Reading List

Source URL: www.math.uni-magdeburg.de

Language: English - Date: 2013-08-14 05:43:02
45Block ciphers / Cryptography / Free software / Serpent / Data Encryption Standard / Python / Cipher / Crypt / Advanced Encryption Standard / Reference implementation / Python syntax and semantics

Nothing better than a Python to write a Serpent Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory Serpent is a 128-bit block cipher designed by Ross

Add to Reading List

Source URL: legacy.python.org

Language: English - Date: 2006-05-04 17:09:08
46

Block ciphers: AES and Modes of Operation January:05 PM Admin: - Midterm test (in class)

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2013-08-05 10:54:57
    47

    Scribe Notes: Lecture 3 COMPApplied Cryptography - Winter 2013 January 29, Stream Ciphers message {0,1}n

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2013-08-05 10:54:57
      48

      Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2005-03-01 14:19:32
        49

        Search for Related-key Differential Characteristics in DES-like ciphers Alex Biryukov and Ivica Nikoli“c? University of Luxembourg {alex.biryukov,ivica.nikolic}uni.lu

        Add to Reading List

        Source URL: www.cryptolux.org

        Language: English - Date: 2013-09-17 06:26:54
          50

          Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2014-06-30 09:32:34
            UPDATE