Cryptanalysis

Results: 756



#Item
561Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
562RC5 / Advanced Encryption Standard / Linear cryptanalysis / Cryptanalysis / Key schedule / Cryptography / Block ciphers / RC6

TM The Security of the RC6

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:22:00
563Py / Block size / Data Encryption Standard / Differential cryptanalysis / Cipher / ICE / Advanced Encryption Standard / Block ciphers / MULTI2 / Cryptography / Stream ciphers / Blowfish

© 1995 Michael Paul Johnson The Diamond2 Block Cipher

Add to Reading List

Source URL: www.cygnusproductions.com

Language: English - Date: 2007-05-23 11:40:44
564Differential cryptanalysis / Slide attack / DES-X / Chosen-plaintext attack / Cryptanalysis / RSA / Ciphertext / Tiny Encryption Algorithm / Cryptography / Data Encryption Standard / Public-key cryptography

Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman1,2 , Nathan Keller2 , and Adi Shamir2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-10-02 05:38:38
565SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-03-19 02:03:06
566Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: tnlandforms.us

Language: English - Date: 2004-12-30 09:37:46
567Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
568Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Cryptography / Randomness / Pseudorandom generator / Random number generation / Elliptic curve cryptography / Normal distribution / Theoretical computer science / Applied mathematics / Mathematics

Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator Berry Schoenmakers and Andrey Sidorenko Dept. of Mathematics and Computer Science, TU Eindhoven,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-09-15 11:33:41
569Tiny Encryption Algorithm / Cipher / Block cipher / Stream cipher / Impossible differential cryptanalysis / Chosen-plaintext attack / Differential cryptanalysis / International Data Encryption Algorithm / Cryptanalysis / Cryptography / XTEA / Symmetric-key algorithm

A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

Add to Reading List

Source URL: www.csshl.net

Language: English - Date: 2011-10-26 10:07:40
570Gender / Interpersonal relationships / Interpersonal chemistry / Love / Gay / Homosexuality / LGBT social movements / Alexander von Humboldt / Alan Turing / Human sexuality / Human behavior / Sexual orientation

Alan Turing - 20th century British mathematician, credited with creating the theoretical framework and design for the earliest modern computer. His conceptual design was dubbed the “Turing machine”. He also lead the British cryptanalysis

Add to Reading List

Source URL: www.noglstp.org

Language: English - Date: 2009-10-13 00:24:48
UPDATE