<--- Back to Details
First PageDocument Content
Linear cryptanalysis / S-box / Lucifer / Cryptanalysis / Ciphertext / Confusion and diffusion / Chosen-plaintext attack / Differential cryptanalysis / ICE / Cryptography / Substitution-permutation network / Block cipher
Date: 2004-06-22 10:36:18
Linear cryptanalysis
S-box
Lucifer
Cryptanalysis
Ciphertext
Confusion and diffusion
Chosen-plaintext attack
Differential cryptanalysis
ICE
Cryptography
Substitution-permutation network
Block cipher

Add to Reading List

Source URL: www.engr.mun.ca

Download Document from Source Website

File Size: 336,15 KB

Share Document on Facebook

Similar Documents

Cryptography / Block ciphers / Data Encryption Standard / Substitution-permutation network / Linear cryptanalysis / Serpent / Q / Advanced Encryption Standard / ARIA / PRESENT / S-box / Stream cipher

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qINF - View Document

Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

DocID: 1aIMB - View Document

Fault injection / MARS / Substitution-permutation network / Message authentication codes / Poly1305-AES / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

DocID: 18qtC - View Document

Block ciphers / Lucifer / Cipher / Symmetric-key algorithm / DEAL / Format-preserving encryption / Substitution-permutation network / Cryptography / Data Encryption Standard / Feistel cipher

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

DocID: 18iUp - View Document

Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

DocID: 12IjB - View Document