Data Encryption Standard

Results: 514



#Item
141Computational complexity theory / Science / Data Encryption Standard / Ethology / Scientific modeling / ICE / Output

Securing Mediated Trace Access Using Black-box Permutation Analysis 1. Prateek Mittal

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2013-07-24 17:00:05
142National Security Agency / Block ciphers / Skipjack / Capstone / Fortezza / Key size / CDMF / Key / Symmetric-key algorithm / Cryptography / Key management / Data Encryption Standard

How to Reverse Engineer an EES Device Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:49
143Cryptanalysis / Symmetric-key algorithm / Cipher / Data Encryption Standard / Stream cipher / Public-key cryptography / Cryptosystem / Key / Advanced Encryption Standard / Cryptography / Key size / Block cipher

Key Lengths Contribution to The Handbook of Information Security Arjen K. Lenstra Citibank, N.A., and Technische Universiteit Eindhoven 1 North Gate Road, Mendham, NJ, U.S.A.

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
144Advanced Encryption Standard / Key management / Triple DES / Tiny Encryption Algorithm / Key size / Blowfish / Related-key attack / Ciphertext / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Key-Schedule Cryptanalysis of DEAL John Kelsey and Bruce Schneier Counterpane Systems {kelsey,schneier}@counterpane.com 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
145Advanced Encryption Standard / Key schedule / Cipher / ICE / Feistel cipher / Block ciphers / Key whitening / Data Encryption Standard / Cryptography / Twofish / Differential cryptanalysis

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
146Key management / ICE / Weak key / International Data Encryption Algorithm / Cryptography / Advanced Encryption Standard / Block ciphers

New Results on the Two sh Encryption Algorithm Bruce Schneier  y

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
147Block ciphers / Serpent / Data Encryption Standard / Key schedule / Field-programmable gate array / Q / Py / RC6 / Twofish / Cryptography / Advanced Encryption Standard / Stream ciphers

A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES RIJNDAEL François-Xavier Standaert, Gael Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:05:31
148Cryptanalysis / Block cipher / MARS / DES-X / Crypt / Advantage / Differential cryptanalysis / Boomerang attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants John Kelsey and Bruce Schneier Counterpane Internet Security, Inc., 3031 Tisch Way, San Jose, CA 95128 {kelsey,schneier}@counterpane.com

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
149Differential-linear attack / Key schedule / Block cipher / Crypt / Data Encryption Standard / SHACAL / Cryptography / Differential cryptanalysis / ICE

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
150Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / International Data Encryption Algorithm / Key schedule / ICE / KASUMI / Tiny Encryption Algorithm / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Cryptanalysis of Full PRIDE Block Cipher Yibin Dai and Shaozhen Chen State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China Zhengzhou Information Science and Technology Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-09 23:36:44
UPDATE