ECRYPT

Results: 169



#Item
81Linear feedback shift register / SNOW / Block cipher modes of operation / Serpent / Primitive polynomial / Q / Grain / Cryptography / Stream ciphers / SOSEMANUK

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-21 11:27:49
82Py / ISAAC / Block cipher / VEST / Cipher / Distinguishing attack / HC-256 / Blowfish / Symmetric-key algorithm / Cryptography / Stream ciphers / RC4

A shortened version of this paper appears under the same title in the proceedings of Asiacrypt[removed]Xuejia Lai, ed.), LNCS, Springer-Verlag. On the (In)security of Stream Ciphers Based on Arrays and Modular Addition? So

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-15 14:18:24
83Linear algebra / Operations research / Digital photography / Digital watermarking / Audio watermark detection / Watermark / Ant colony optimization algorithms / Travelling salesman problem / ECRYPT / Mathematics / Algebra / Watermarking

c Journal of Information Hiding and Multimedia Signal Processing 2011 ISSN[removed]Ubiquitous International Volume 2, Number 4, October 2011

Add to Reading List

Source URL: bit.kuas.edu.tw

Language: English - Date: 2014-09-05 15:21:32
84National Security Agency / Cryptanalysis / ECRYPT / International Cryptology Conference / The Codebreakers / Books on cryptography / Cryptography / Cipher / William F. Friedman

Microsoft Word - Cyber Missions Annotated Bibliography.docx

Add to Reading List

Source URL: www.nationalmuseum.af.mil

Language: English - Date: 2014-09-22 10:06:57
85COSIC / Bart Preneel / Katholieke Universiteit Leuven / ECRYPT / NESSIE / Len Sassaman / RIPEMD / Cryptography / Flemish people / Year of birth missing

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:06:28
86Graduate school / Science / Knowledge / International Cryptology Conference / ECRYPT / Cryptography

IACR Policy for Cryptology Schools April 2014∗ 1 Purpose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-05-02 08:18:46
87SOSEMANUK / UES / Advanced Encryption Standard / Lecture Notes in Computer Science / Cipher / ECRYPT / ESTREAM / Cryptography / Stream ciphers / DECIM

Thomas PORNIN 2977 rue de Deschambault Québec G1W 1B4 Québec – Canada Tel: +1 (418) 977-7531

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:56
88Hashing / MD4 / Bart Preneel / Preimage attack / Hash list / Hash function / RIPEMD / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-08-19 15:26:30
89COSIC / ECRYPT / Cryptography / École Polytechnique Fédérale de Lausanne / Recommender system / Technische Hochschule / KANT / Security / Education / Knowledge / Academia

PDF Document

Add to Reading List

Source URL: www.innovation.public.lu

Language: English - Date: 2013-09-06 06:55:53
90Finite fields / Cryptographic protocols / Diffie–Hellman problem / Hellman / XTR / CDH / Diffie–Hellman key exchange / Whitfield Diffie / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:48:24
UPDATE