Cryptanalysis

Results: 756



#Item
581Elizebeth Friedman / William F. Friedman / Friedman / George Fabyan / Voynich manuscript / Cryptanalysis / Riverbank Laboratories / Shakespeare authorship question / Cryptography

The Elizebeth Smith Friedman Collection Biographical Sketch

Add to Reading List

Source URL: www.marshallfoundation.org

Language: English - Date: 2008-05-22 15:28:18
582SHA-1 / MD5 / Collision attack / MD4 / SHA-2 / Cryptanalysis / Padding / Crypt / Tiger / Cryptography / Cryptographic hash functions / Hashing

Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-06-08 07:57:19
583GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
584Key schedule / Differential cryptanalysis / Vincent Rijmen / Q / ARIA / Linear cryptanalysis / S-box / Serpent / XSL attack / Cryptography / Block ciphers / Advanced Encryption Standard

AES and the Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2,3 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
585Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
586NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
587Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1

Add to Reading List

Source URL: www.math.huji.ac.il

Language: English - Date: 2010-09-02 14:16:20
588ICE / Key schedule / Block cipher / Cryptanalysis / Differential of a function / Differential / Boomerang attack / FEAL / Cryptography / Differential cryptanalysis / Feistel cipher

BRICS BRICS RS-95-9

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1996-10-15 07:49:33
589Block ciphers / Differential cryptanalysis / Key schedule / Impossible differential cryptanalysis / Cipher / Linear cryptanalysis / Differential / SHARK / Cryptography / Mathematical analysis / Espionage

Impossible Dif ferential Cryptanalysis of SPN Ciphers Ruilin Li1 , Bing Sun1 and Chao Li1,2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-29 05:10:15
590XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE