Key schedule

Results: 499



#Item
131Public key certificate / Certificate signing request / Key management / Electronic commerce / Public-key cryptography

Schedule 8 - Request for Approval of Operator in Good Standing

Add to Reading List

Source URL: www.health.ny.gov

Language: English - Date: 2014-09-05 13:28:57
132Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
133Door furniture / Lockset / Door / Key / Builders hardware / Electronic lock / Gates / Locks / Architecture

Door hardware selection schedule Project details Schedule abbreviations Project name: Door leaf/frame type Lock furniture type Project location:

Add to Reading List

Source URL: natspec.com.au

Language: English - Date: 2015-03-16 23:46:25
134Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
135Advanced Encryption Standard / Ciphertext / Stream ciphers

Differential Fault Analysis on the AES Key Schedule Junko TAKAHASHI and Toshinori FUKUNAGA NTT Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corporation, {takahashi.junko, fukunaga.toshinori}@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-27 04:55:53
136Camellia / SAFER / RC6 / Feistel cipher / Key schedule / ICE / Cipher / Data Encryption Standard / Index of cryptography articles / Cryptography / Block ciphers / Hierocrypt

I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 08:53:09
137Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-23 12:55:44
138Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
139Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
140Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
UPDATE