Differential cryptanalysis

Results: 238



#Item
221RC5 / MISTY1 / Key schedule / Integral cryptanalysis / RC6 / Impossible differential cryptanalysis / Ciphertext / Boomerang attack / Differential cryptanalysis / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 10:58:11
222SHA-1 / Differential cryptanalysis / Hash function / Rectangular function / MD4 / Collision resistance / Tiger / Whirlpool / N-Hash / Cryptographic hash functions / Cryptography / Preimage attack

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-04-09 11:04:26
223Cryptographic hash functions / MD5 / SHA-1 / Collision attack / Differential equation / HMAC / Differential cryptanalysis / ICE / Cryptography / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-25 01:29:37
224Fourier analysis / Transforms / Hadamard transform / Differential cryptanalysis / Fourier transform / Hilbert transform / Mathematical analysis / Mathematics / Integral transforms

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-02 12:04:37
225Adi Shamir / Ron Rivest / Leonard Adleman / RSA / RC4 / Cipher / Digital signature / Differential cryptanalysis / Stream cipher / Cryptography / Turing Award laureates / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.math.uwaterloo.ca

Language: English - Date: 2010-10-13 14:11:04
226Cryptanalysis / RSA / Differential fault analysis / Cryptography / Public-key cryptography / Side channel attack

PDF Document

Add to Reading List

Source URL: www.lsec.be

Language: English - Date: 2008-01-07 09:41:27
227SHA-1 / MD5 / Differential cryptanalysis / Collision attack / Crypt / Cryptography / Cryptographic hash functions / MD4

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:15
228VEST / Differential cryptanalysis / ESTREAM / M6 / Stream ciphers / Cryptography / Salsa20

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:29:38
229Trivium / Differential cryptanalysis / Py / IP / ICE / Cryptography / Stream ciphers / Cube attack

PDF Document

Add to Reading List

Source URL: hs-bremerhaven.de

Language: English - Date: 2009-02-28 14:24:13
230Tiger / SHA-1 / MD5 / Differential cryptanalysis / Block cipher / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / MD4

PDF Document

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-03-09 11:16:09
UPDATE