Data Encryption Standard

Results: 514



#Item
381Law / Advanced Encryption Standard / Information / Copyright law of the United States / Copyright / Publication / Free content / Moral rights / Intellectual property law / Copyright law / Data

DOC Document

Add to Reading List

Source URL: www.ejournal.aessangli.in

Language: English - Date: 2011-10-07 01:27:28
382SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - preneel_abudhabiv2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-12-11 02:59:17
383Tiny Encryption Algorithm / Blowfish / Block cipher / Key schedule / Feistel cipher / ICE / Weak key / Ciphertext / Cipher / Cryptography / Data Encryption Standard / Slide attack

Advanced Slide Attacks Alex Biryukov? and David Wagner?? Abstract. Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a h

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-02 04:12:28
384Data Encryption Standard / RC6 / Cryptographic software / Cipher / Key size / Triple DES / Serpent / XSL attack / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

136 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010 Switching between the AES-128 and AES-256 Using Ks * & Two Keys

Add to Reading List

Source URL: paper.ijcsns.org

Language: English - Date: 2014-03-16 20:13:45
385Differential cryptanalysis / Piling-up lemma / Block cipher / Cryptanalysis / Cryptography / Linear cryptanalysis / Data Encryption Standard

The Effectiveness of the Linear Hull Effect S. Murphy Technical Report RHUL–MA–2009–19 16 October 2009

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2009-11-03 09:17:15
386ICE / Block cipher / S-box / VEST / Substitution-permutation network / Differential cryptanalysis / Cryptography / Data Encryption Standard / Cryptographic hash functions

PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:40
387Stream ciphers / Message authentication codes / Block cipher / Data Encryption Standard / Cipher / Linear cryptanalysis / Nicolas Courtois / Key schedule / Hidden Field Equations / Cryptography / XSL attack / Advanced Encryption Standard

Computational and Algebraic Aspects of the Advanced Encryption Standard Carlos Cid, Sean Murphy and Matthew Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-03 11:48:26
388Keystream / Grain / RC4 / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalysis of a Stream Cipher due to Lin and Shepherd Simon R. Blackburn Karl Brincaty Fauzan Mirza Sean Murphy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:38:56
389Boomerang attack / Differential cryptanalysis / Data Encryption Standard / Block cipher / Rijndael S-box / XTR / Information theory / Cryptography / Advanced Encryption Standard / Finite fields

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, XXX 20XX 2 The Return of the Cryptographic Boomerang S. Murphy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-09-06 08:29:39
390Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

The Effectiveness of the Linear Hull Effect S. Murphy Information Security Group, Department of Mathematics, Royal Holloway, Egham, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-06-19 12:53:49
UPDATE