ECRYPT

Results: 169



#Item
11

Special Workshop sponsored by the ECRYPT II Network of Excellence SKEW 2011 Symmetric Key Encryption Workshop Collocated with FSE 2011 February 16–17, 2011

Add to Reading List

Source URL: skew2011.mat.dtu.dk

Language: English - Date: 2011-01-12 05:14:31
    12

    DOC Document

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2005-04-11 05:32:42
      13

      A Stream Cipher Proposal: Grain-128 Martin Hell, Thomas Johansson, Alexander Maximov Willi Meier Department of Information Technology

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      - Date: 2007-03-29 16:18:54
        14

        Special Workshop to be hosted by the ECRYPT Network of Excellence SASC 2008 State of the Art of Stream Ciphers February 13–14, 2008 Lausanne, Switzerland

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        - Date: 2007-11-20 08:00:45
          15

          The self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 Joan Daemen, STMicroelectronics Belgium, Paris Kitsos, Hellenic Open University, Patras, Greece, 8 Decembe

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          - Date: 2007-04-06 08:40:39
            16

            A note on the Edon80 S-box T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            - Date: 2007-10-19 09:39:38
              17

              How to Break Py and Pypy by a Chosen-IV Attack Takanori Isobe1 , Toshihiro Ohigashi1 , Hidenori Kuwakado2 , and Masakatu Morii2 1

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              - Date: 2007-02-22 22:33:36
                18

                Microsoft Word - DICING-CSB-3.doc

                Add to Reading List

                Source URL: www.ecrypt.eu.org

                - Date: 2007-04-03 22:29:30
                  19

                  Understanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons Carmi Gressel,1 Orr Dunkelman,2 Avi Hecht1 FortressGB Ltd.1 & Katholieke Universitiet Leuven2 [carmi, ]1 []

                  Add to Reading List

                  Source URL: www.ecrypt.eu.org

                  - Date: 2008-02-15 09:35:23
                    20

                    Appendices Appendix A: AIS 31 type Report for the ZK-Crypt Noise Generator in Deterministic Mode Appendix B: Interacting Blocks in the ZK-Crypt Dual Track FB Circuits – [1S] Appendix C: Interacting Random Controller, D

                    Add to Reading List

                    Source URL: www.ecrypt.eu.org

                    Language: English - Date: 2008-02-15 09:35:38
                      UPDATE