<--- Back to Details
First PageDocument Content
Index of cryptography articles / Stream cipher / FEAL / Cipher / WAKE / RC5 / Feistel cipher / Differential cryptanalysis / Cryptanalysis / Cryptography / Data Encryption Standard / Block cipher
Date: 2011-07-10 02:35:13
Index of cryptography articles
Stream cipher
FEAL
Cipher
WAKE
RC5
Feistel cipher
Differential cryptanalysis
Cryptanalysis
Cryptography
Data Encryption Standard
Block cipher

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Download Document from Source Website

File Size: 156,63 KB

Share Document on Facebook

Similar Documents

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France  Abstract. In this work we study the security of Chaskey, a recent

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

DocID: 1xTE8 - View Document

Chaskey  ARX Cryptanalysis Improved Differential-Linear

Chaskey ARX Cryptanalysis Improved Differential-Linear

DocID: 1xT7u - View Document

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

DocID: 1udaS - View Document

Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $  University of Massachusetts, 01002 USA

Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USA

DocID: 1tfZi - View Document

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology  `

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document