<--- Back to Details
First PageDocument Content
Cryptography standards / NESSIE / MISTY1 / KHAZAD / SHA-2 / Katholieke Universiteit Leuven / SHACAL / Leuven / Whirlpool / Cryptography / Block ciphers / Cryptographic hash functions
Date: 2005-06-13 10:26:02
Cryptography standards
NESSIE
MISTY1
KHAZAD
SHA-2
Katholieke Universiteit Leuven
SHACAL
Leuven
Whirlpool
Cryptography
Block ciphers
Cryptographic hash functions

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Download Document from Source Website

File Size: 4,53 MB

Share Document on Facebook

Similar Documents

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others Alex Biryukov and Ivica Nikoli´c? University of Luxembourg {alex.biryukov,ivi

DocID: 1uCoE - View Document

Block ciphers / Reconfigurable computing / AES implementations / DEAL / Field-programmable gate array / LEX / Xilinx / KHAZAD / Cryptography / Advanced Encryption Standard / Data Encryption Standard

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

DocID: 155pv - View Document

Advanced Encryption Standard / SHARK / Integral cryptanalysis / ICE / Key schedule / Linear cryptanalysis / Differential cryptanalysis / International Data Encryption Algorithm / VEST / Cryptography / Block ciphers / KHAZAD

A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux Cedex, France [removed]

DocID: NkFT - View Document

Blowfish / Symmetric-key algorithm / KHAZAD / Block size / Square / Cipher / Advanced Encryption Standard / Data Encryption Standard / MARS / Cryptography / Block ciphers / Twofish

Programming with GNU Crypto Version 2.0.0, 9 November 2003 Casey Marshall Raif S. Naffah

DocID: CDgj - View Document

Cryptography standards / NESSIE / MISTY1 / KHAZAD / SHA-2 / Katholieke Universiteit Leuven / SHACAL / Leuven / Whirlpool / Cryptography / Block ciphers / Cryptographic hash functions

PDF Document

DocID: 8Rv5 - View Document