Differential cryptanalysis

Results: 238



#Item
111CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
112Report on Present State of CIPHERUNICORN-E Cipher Evaluation (full evaluation) January 28, 2002 Toshio Tokita, Member

Report on Present State of CIPHERUNICORN-E Cipher Evaluation (full evaluation) January 28, 2002 Toshio Tokita, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
113Report on Present State of CIPHERUNICORN-A Cipher Evaluation (full evaluation) January 28, 2002 Masayuki Kanda, Member

Report on Present State of CIPHERUNICORN-A Cipher Evaluation (full evaluation) January 28, 2002 Masayuki Kanda, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
114ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
115

PDF Document

Add to Reading List

Source URL: www.smartsantander.eu

Language: English - Date: 2012-09-27 06:47:34
116ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-12-21 10:15:18
117ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
118Cryptographic Analysis of All 4 × 4-Bit S-Boxes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Cryptographic Analysis of All 4 × 4-Bit S-Boxes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
119Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed]  Abstract. We present attacks on full Hummingbird-2 which are able to recover

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
120New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Jean-Philippe Aumasson1 , Simon Fischer1 , Shahram Khazaei2 , Willi Meier1 , and Christian Rechberger3 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-03-14 11:46:34