Cryptanalysis

Results: 756



#Item
261Cryptanalysis / Chosen-plaintext attack / Ciphertext / Advantage / Stream ciphers / Cryptography / Cellular Message Encryption Algorithm / Substitution cipher

Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
262ICE / International Data Encryption Algorithm / Cryptographic hash functions / GOST / KASUMI / Cryptography / Block ciphers / Akelarre

Cryptanalysis of Akelarre Niels Ferguson Bruce Schneier DigiCash bv Counterpane Systems Kruislaan 419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
263Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
264Advanced Encryption Standard / Key schedule / Cipher / ICE / Feistel cipher / Block ciphers / Key whitening / Data Encryption Standard / Cryptography / Twofish / Differential cryptanalysis

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
265Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
266Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
267

Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

Add to Reading List

Source URL: www.schneier.com

- Date: 2014-03-02 23:18:32
    268Serpent / ICE / Advanced Encryption Standard / Completeness / Chosen-plaintext attack / Crypt / Ciphertext / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

    Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    269Twofish / Advanced Encryption Standard / ICE / S-box / Cryptography / Differential cryptanalysis / Differential

    Twofish Technical Report #1 Upper bounds on differential characteristics in Twofish Niels Ferguson Counterpane Systems

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    270Cryptanalysis / Block cipher / MARS / DES-X / Crypt / Advantage / Differential cryptanalysis / Boomerang attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

    MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants John Kelsey and Bruce Schneier Counterpane Internet Security, Inc., 3031 Tisch Way, San Jose, CA 95128 {kelsey,schneier}@counterpane.com

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:30
    UPDATE