Cryptanalysis

Results: 756



#Item
61Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
62A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
63Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
64Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
65ICS423: Data Security and Cryptography I Synopsis History of secret communication and confidential data storage. Elements of cryptography and cryptanalysis. Classical ciphers. Symmetric key cryptography. Public key crypt

ICS423: Data Security and Cryptography I Synopsis History of secret communication and confidential data storage. Elements of cryptography and cryptanalysis. Classical ciphers. Symmetric key cryptography. Public key crypt

Add to Reading List

Source URL: www.asecolab.org

- Date: 2015-08-25 22:40:59
    66Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    67Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

    Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

    Add to Reading List

    Source URL: ctcrypt.ru

    Language: English - Date: 2016-06-10 06:35:42
    68Assignment 6 L645 / B659 Due Monday, OctoberHidden Markov Models One application of HMMs is cryptanalysis. Imagine a simple substitution code, in which every character of the English alphabet is substituted by ano

    Assignment 6 L645 / B659 Due Monday, OctoberHidden Markov Models One application of HMMs is cryptanalysis. Imagine a simple substitution code, in which every character of the English alphabet is substituted by ano

    Add to Reading List

    Source URL: cl.indiana.edu

    Language: English - Date: 2015-10-12 15:05:59
    69Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Modern Cryptography M. Edwards Recap Evolution of Cryptography

    Add to Reading List

    Source URL: xn--bta-yla.net

    Language: English - Date: 2014-12-31 11:24:35
    70Microsoft Word - Modulhandbuch-MI-taoc-2012.doc

    Microsoft Word - Modulhandbuch-MI-taoc-2012.doc

    Add to Reading List

    Source URL: cosec.bit.uni-bonn.de

    Language: English - Date: 2014-02-03 06:03:06