Cryptanalysis

Results: 756



#Item
321Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
322Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
323IBM 728 / Keystream / Stream cipher / Leninets class submarine

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF ⋆ Alex Biryukov, Ilya Kizhvatov, and Bin Zhang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-27 22:31:32
324Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE

Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:13
325Linear cryptanalysis / Differential cryptanalysis / ICE / Authenticated encryption / Stream ciphers / Cryptography / Advanced Encryption Standard / Block cipher

Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Beg¨ ul Bilgin1,2 , Andrey Bogdanov3 , Miroslav Kneˇzevi´c4 , Florian Mendel5 , and Qingju Wang1,6 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:35:21
326Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-22 00:23:21
327Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-04-08 23:59:34
328Electronic commerce / RSA / Key / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Exploiting Poor Randomness: Lattice-Based Techniques Nadia Heninger University of Pennsylvania October 16, 2014

Add to Reading List

Source URL: attackschool.di.uminho.pt

Language: English - Date: 2014-11-03 05:59:17
329Modular arithmetic / M6 / RC5 / ICE / Differential cryptanalysis / Akelarre / RC6 / Linear cryptanalysis / Madryga / Cryptography / Block ciphers / Mod n cryptanalysis

Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
330McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE