<--- Back to Details
First PageDocument Content
Block cipher / Cryptanalysis / Feistel cipher / Key schedule / Tiny Encryption Algorithm / Index of cryptography articles / Encryption by date / Cryptography / CIPHERUNICORN-A / CIPHERUNICORN-E
Date: 2013-06-03 22:32:58
Block cipher
Cryptanalysis
Feistel cipher
Key schedule
Tiny Encryption Algorithm
Index of cryptography articles
Encryption by date
Cryptography
CIPHERUNICORN-A
CIPHERUNICORN-E

A Cryptographic Review of Cipherunicorn-E

Add to Reading List

Source URL: www.ipa.go.jp

Download Document from Source Website

File Size: 274,96 KB

Share Document on Facebook

Similar Documents

Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

DocID: 1qY1X - View Document

Cryptography / Radio-frequency identification / Data Encryption Standard / Automatic identification and data capture / Wireless / Feistel cipher / Singulation / Advanced Encryption Standard / Stream cipher / Digital signature / Digital signature transponder

Proceedings - NN - RFIDSec08

DocID: 1qGBX - View Document

Cryptography / Authenticated encryption / Block cipher mode of operation / Semantic security / RSA / Ciphertext / Integrated Encryption Scheme / Feistel cipher

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

DocID: 1q88i - View Document

Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document