Cryptanalysis

Results: 756



#Item
61Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
62Block ciphers / Data Encryption Standard / Linear cryptanalysis / Advanced Encryption Standard / Q / S-box / ICE / Differential cryptanalysis / VEST / PRESENT / Stream cipher / Key schedule

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
63Applied mathematics / Cryptography / Block ciphers / Data Encryption Standard / Cryptanalysis / Linear cryptanalysis / Differential cryptanalysis / S-box / Advanced Encryption Standard / PRESENT / LOKI

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
64Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
65

ICS423: Data Security and Cryptography I Synopsis History of secret communication and confidential data storage. Elements of cryptography and cryptanalysis. Classical ciphers. Symmetric key cryptography. Public key crypt

Add to Reading List

Source URL: www.asecolab.org

- Date: 2015-08-25 22:40:59
    66NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    67Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

    Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

    Add to Reading List

    Source URL: ctcrypt.ru

    Language: English - Date: 2016-06-10 06:35:42
    68Markov models / Viterbi algorithm / Bigram / Forward algorithm

    Assignment 6 L645 / B659 Due Monday, OctoberHidden Markov Models One application of HMMs is cryptanalysis. Imagine a simple substitution code, in which every character of the English alphabet is substituted by ano

    Add to Reading List

    Source URL: cl.indiana.edu

    Language: English - Date: 2015-10-12 15:05:59
    69Cryptography / Applied mathematics / Key management / Cipher / Cryptanalysis / Block cipher / One-time pad / Data Encryption Standard / Key / Index of cryptography articles / Book:Cryptography

    Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Add to Reading List

    Source URL: xn--bta-yla.net

    Language: English - Date: 2014-12-31 11:24:35
    70Applied mathematics / Joachim von zur Gathen / Cryptography / Cryptanalysis

    Microsoft Word - Modulhandbuch-MI-taoc-2012.doc

    Add to Reading List

    Source URL: cosec.bit.uni-bonn.de

    Language: English - Date: 2014-02-03 06:03:06
    UPDATE