Cryptanalysis

Results: 756



#Item
461Block cipher / Linear cryptanalysis / Cryptanalysis / Symmetric-key algorithm / COCONUT98 / CIPHERUNICORN-E / Cryptography / Differential cryptanalysis / CIPHERUNICORN-A

Report on Present State of CIPHERUNICORN-A Cipher Evaluation (full evaluation) January 28, 2002 Masayuki Kanda, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
462Mitsuru Matsui / Data Encryption Standard / MISTY1 / Advanced Encryption Standard / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptanalysis / Block cipher

Relay of Messages from Contemporary Inventors to the Next Generation

Add to Reading List

Source URL: www.jpo.go.jp

Language: English - Date: 2014-03-12 23:47:36
463Post-quantum cryptography / XSL attack / Key schedule / QUAD / Block cipher / Hidden Field Equations / Differential cryptanalysis / Q / Cipher / Cryptography / Advanced Encryption Standard / Stream ciphers

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
464Block cipher / Linear cryptanalysis / Confusion and diffusion / Q / Permutation / Ciphertext / Cipher / Substitution cipher / BassOmatic / Cryptography / Mathematics / Substitution-permutation network

Substitution-Permutation Networks and Linear Cryptanalysis

Add to Reading List

Source URL: www.csc.kth.se

Language: English
465Advanced Encryption Standard / Cryptanalysis / Data Encryption Standard / Block cipher / XSL attack / Cryptography / Nicolas Courtois / KeeLoq

PDF Document

Add to Reading List

Source URL: algant.eu

Language: English - Date: 2013-12-19 22:51:07
466NOEKEON / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / GOST / VEST / Q / Skipjack / ICE / Cryptography / Block ciphers / Stream ciphers

PDF Document

Add to Reading List

Source URL: www.smartsantander.eu

Language: English - Date: 2012-09-27 06:47:34
467Quantum key distribution / Network architecture / Computer network security / Node / Public-key cryptography / Cryptanalysis / Computer security / Telecommunications network / Secure Communication based on Quantum Cryptography / Cryptography / Quantum cryptography / Quantum information science

CONTACT: ROBERT CARRUTHERS • [removed] • [removed] Secure Relaying Protocol with Partial Trust for QKD-Secured Networks TECH ID #: 730.1

Add to Reading List

Source URL: www.innovatecalgary.com

Language: English - Date: 2014-06-10 16:35:17
468Debugging / Software bug / Programmer / Cryptanalysis / Subroutine / Computer / Program animation / Computing / Computer programming / Software engineering

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-11-05 10:01:40
469Transposition cipher / Vigenère cipher / Polyalphabetic cipher / Cryptanalysis / Enigma machine / Rotor machine / Classical cipher / Cryptography / Substitution cipher / Cipher

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2010-08-13 11:59:35
470Transposition cipher / Grille / Cryptanalysis / Bletchley Park / Cryptography / Buckinghamshire / Permutations

EO[removed]b) EO[removed]c[removed]d) TOP SECRET

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-05 01:38:28
UPDATE