Differential cryptanalysis

Results: 238



#Item
201Key management / Data Encryption Standard / Symmetric-key algorithm / ICE / RC5 / Substitution-permutation network / Differential cryptanalysis / Key schedule / RC6 / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-10-17 12:38:23
202Differential cryptanalysis / ICE / Linear cryptanalysis / Key schedule / Feistel cipher / International Data Encryption Algorithm / Entropy / VEST / Cryptography / Block ciphers / RC2

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
203Differential cryptanalysis / Boomerang attack / Substitution-permutation network / ICE / Q / Brute-force attack / Serpent / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
204Differential-linear attack / ICE / International Data Encryption Algorithm / Cryptanalysis / Block cipher / Weak key / Key schedule / FEAL / Blowfish / Cryptography / Differential cryptanalysis / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
205Differential-linear attack / Initialization vector / Differential cryptanalysis / Linear cryptanalysis / Confusion and diffusion / Z4 / ICE / Normal distribution / Keystream / Cryptography / Stream ciphers / Phelix

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-12-12 15:42:51
206SHA-1 / SHA-2 / Advanced Encryption Standard / Differential cryptanalysis / Grøstl / Whirlpool / MD5 / Hash function / MD4 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www2.mat.dtu.dk

Language: English - Date: 2009-04-16 05:24:05
207Covariance and correlation / Fourier analysis / Linear cryptanalysis / Differential cryptanalysis / Correlation and dependence / Correlation attack / Block cipher / Fourier transform / Finite difference / Cryptography / Mathematical analysis / Mathematics

PDF Document

Add to Reading List

Source URL: www2.compute.dtu.dk

Language: English - Date: 2012-09-08 14:19:49
208NIST hash function competition / Keccak / Joan Daemen / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / Permutation / Linear cryptanalysis / Cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
209Idea NXT / Key schedule / Advanced Encryption Standard / International Data Encryption Algorithm / Linear feedback shift register / XSL attack / Cryptography / Block ciphers / Differential cryptanalysis

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:18
210Signal processing / Block cipher / Linear cryptanalysis / Advantage / Differential cryptanalysis / Ciphertext / Data Encryption Standard / Cipher / Cryptanalysis / Cryptography / Decorrelation / Image processing

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:21
UPDATE