Cryptanalysis

Results: 756



#Item
271Differential-linear attack / Key schedule / Block cipher / Crypt / Data Encryption Standard / SHACAL / Cryptography / Differential cryptanalysis / ICE

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
272Cryptography / Security / National Security Agency / United States government secrecy / Cipher / Rotor machines / Enigma machine / Cryptanalysis of the Enigma / National security / Surveillance / Mass surveillance

REPORT OF COMMUNICATIONS SECURITY VIOLATIONS

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-04-24 17:17:17
273Blowfish / Ciphertext / Block cipher / Chosen-plaintext attack / Cipher / Cryptanalysis / Advanced Encryption Standard / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall1 1 Counterpane Systems {hall,kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
274Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / International Data Encryption Algorithm / Key schedule / ICE / KASUMI / Tiny Encryption Algorithm / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Cryptanalysis of Full PRIDE Block Cipher Yibin Dai and Shaozhen Chen State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China Zhengzhou Information Science and Technology Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-09 23:36:44
275Twofish / Differential cryptanalysis / Advanced Encryption Standard / Key schedule / Key size / GOST / Block cipher / Related-key attack / Public-key cryptography / Cryptography / Key management / Weak key

Twofish Technical Report #6 A Twofish Retreat: Related-Key Attacks Against Reduced-Round Twofish Niels Ferguson∗

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
276Block cipher / Key schedule / Linear cryptanalysis / Advanced Encryption Standard / Cryptanalysis / VEST / Cipher / Feistel cipher / FEAL / Cryptography / Stream ciphers / Differential cryptanalysis

Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-06-27 11:00:28
277Stream ciphers / Ciphertext / Cryptanalysis / Block cipher / Key schedule / RSA / Madryga / SXAL/MBAL / Cryptography / Advanced Encryption Standard / Rijndael key schedule

Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
278A5/1 / Linear feedback shift register / Cellular Message Encryption Algorithm / Py / Correlation attack / RC4 / Cryptography / Stream ciphers / Keystream

Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
279Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
280ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE