Cryptanalysis

Results: 756



#Item
681Data Encryption Standard / Differential cryptanalysis / ICE / Piling-up lemma / Q / Advanced Encryption Standard / Substitution-permutation network / Key schedule / S-box / Cryptography / Block ciphers / Linear cryptanalysis

PDF Document

Add to Reading List

Source URL: www.engr.mun.ca

Language: English - Date: 2004-04-29 17:27:30
682Substitution-permutation network / Q / Differential cryptanalysis / Key schedule / Advanced Encryption Standard / Data Encryption Standard / Cryptography / Block ciphers / Linear cryptanalysis

PDF Document

Add to Reading List

Source URL: www.cs.rit.edu

Language: English - Date: 2011-01-28 21:35:48
683H64 / Advanced Encryption Standard / Weak key / Differential cryptanalysis / ICE / International Data Encryption Algorithm / Slide attack / Linear cryptanalysis / Ciphertext / Cryptography / Spectr-H64 / Block ciphers

PDF Document

Add to Reading List

Source URL: www.eee.metu.edu.tr

Language: English - Date: 2003-09-11 11:34:22
684Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

PDF Document

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:40
685Public-key cryptography / Cipher / Plaintext / Chosen-plaintext attack / Block cipher / Stream cipher / Key / Initialization vector / Index of cryptography articles / Cryptography / One-time pad / Cryptanalysis

PDF Document

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:36:34
686Key management / Data Encryption Standard / Symmetric-key algorithm / ICE / RC5 / Substitution-permutation network / Differential cryptanalysis / Key schedule / RC6 / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-10-17 12:38:23
687Differential cryptanalysis / ICE / Linear cryptanalysis / Key schedule / Feistel cipher / International Data Encryption Algorithm / Entropy / VEST / Cryptography / Block ciphers / RC2

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
688Differential cryptanalysis / Boomerang attack / Substitution-permutation network / ICE / Q / Brute-force attack / Serpent / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
689Differential-linear attack / ICE / International Data Encryption Algorithm / Cryptanalysis / Block cipher / Weak key / Key schedule / FEAL / Blowfish / Cryptography / Differential cryptanalysis / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
690Substitution cipher / Cipher / Enigma machine / Polyalphabetic cipher / Bombe / Lorenz cipher / Transposition cipher / Known-plaintext attack / Cryptanalysis of the Enigma / Cryptography / Espionage / Bletchley Park

PDF Document

Add to Reading List

Source URL: www.codesandciphers.org.uk

Language: English - Date: 2013-08-19 02:09:53
UPDATE