Cryptanalysis

Results: 756



#Item
491Stream cipher / Linear cryptanalysis / Message authentication codes / Cryptography / Block cipher modes of operation / Block cipher

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, and Eric M. Smith R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA.

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
492Substitution-permutation network / ICE / Linear cryptanalysis / Differential cryptanalysis / S-box / Lucifer / Q / Canonical form / Data Encryption Standard / Cryptography / Block ciphers / Permutations

Cryptographic Analysis of All 4 × 4-Bit S-Boxes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
493Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
494ICE / Differential cryptanalysis / Correlation attack / VEST / Cryptography / Stream ciphers / Salsa20

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 11:46:34
495ICE / Ciphertext / Linear feedback shift register / Chosen-plaintext attack / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / Stream cipher

Cryptanalysis of Hummingbird-1 Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
496GOST / Block cipher / Cipher / Advanced Encryption Standard / Cryptanalysis / LOKI / Index of cryptography articles / Cryptography / Indocrypt / Fast Software Encryption

Dr. Markku-Juhani O. Saarinen Trondheim, Norway Curriculum Vitae, July[removed]removed] www.mjos.fi EDUCATION Ph.D. Information Security

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-17 15:19:21
497Advanced Encryption Standard / Nibble / Block cipher / Stream cipher / Cryptography / Differential cryptanalysis / ICE

Practical attack on 8 rounds of the lightweight block cipher KLEIN Jean-Philippe Aumasson1 , Mar´ıa Naya-Plasencia2,∗ , and Markku-Juhani O. Saarinen3 1

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
498Electronic commerce / Finite fields / Key size / RSA / Key / Brute-force attack / XTR / Cryptanalysis / Quantum computer / Cryptography / Public-key cryptography / Key management

Selecting Cryptographic Key Sizes Arjen K. Lenstra1 , Eric R. Verheul2 1 Citibank, N.A., and Technische Universiteit Eindhoven, 1 North Gate Road, Mendham, NJ[removed], U.S.A.,

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2003-06-05 07:41:02
499Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
500Stream ciphers / Field-programmable gate array / Cryptanalysis / Xilinx / Key size / A5/1 / SciEngines GmbH / Data Encryption Standard / Cryptography / Reconfigurable computing / Brute-force attack

Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2006-12-06 10:54:32
UPDATE