Cryptanalysis

Results: 756



#Item
541Advanced Encryption Standard process / National Institute of Standards and Technology / Cryptography standards / MARS / Twofish / Differential cryptanalysis / NESSIE / Q / Outline of cryptography / Cryptography / Advanced Encryption Standard / Block ciphers

NESSIE Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2001-02-26 10:10:48
542Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

The Effectiveness of the Linear Hull Effect S. Murphy Information Security Group, Department of Mathematics, Royal Holloway, Egham, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-06-19 12:53:49
543Block cipher / ICE / Ciphertext / Chosen-plaintext attack / Differential cryptanalysis / Classical cipher / Cryptography / Data Encryption Standard / Cryptanalysis

June 14, [removed]Markov Ciphers and

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:38:20
544GOST standards / GOST / Hashing / SHA-1 / MD5 / Keccak / Hash function / Advanced Encryption Standard / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-10 21:29:48
545Chosen-plaintext attack / Lossless data compression / Ciphertext / Data compression / Plaintext / Advanced Encryption Standard / Known-plaintext attack / Cipher / Cryptanalysis / Cryptography / Espionage / Cyberwarfare

Compression and Information Leakage of Plaintext John Kelsey, Certicom ([removed]) 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
546Transposition cipher / Cryptanalysis / Caesar cipher / One-time pad / Stream cipher / Code / Index of cryptography articles / Classical cipher / Cryptography / Cipher / Substitution cipher

Notes on cryptography Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS

Add to Reading List

Source URL: www.maths.qmul.ac.uk

Language: English - Date: 2003-11-28 05:01:22
547Advanced Encryption Standard / Serpent / LOKI / Differential cryptanalysis / MARS / RC6 / Symmetric-key algorithm / DEAL / UES / Cryptography / Block ciphers / Data Encryption Standard

Serpent and Smartcards Ross Anderson1 Eli Biham2 Lars Knudsen3

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2000-03-11 06:42:23
548RC4 / Ciphertext / One-time pad / Block cipher / Cipher / Correlation attack / Gilbert Vernam / Running key cipher / Cryptanalysis / Cryptography / Stream ciphers / Keystream

Stream Ciphers RSA Laboratories Technical Report TR-701 Version 2.0|July 25, 1995 M.J.B. Robshaw

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
549Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
550MD4 / Tiger / RIPEMD / SHA-2 / Institute for Applied Information Processing and Communications / Vincent Rijmen / FORK-256 / Hash list / Cryptanalysis / Cryptographic hash functions / Cryptography / SHA-1

Microsoft PowerPoint - AlternativeHashFunctions_talk5

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
UPDATE