Key schedule

Results: 499



#Item
441Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: tnlandforms.us

Language: English - Date: 2004-12-30 09:37:46
442Block ciphers / CRYPTON / Weak key / Key schedule / Key size / Cryptography / Advanced Encryption Standard / Key management

Organization: ESAT, K.U.Leuven, Belgium Date: Fri, 28 Aug 1998 11:36:03 +0200 (METDST) From: Johan Borst

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
443Key schedule / Differential cryptanalysis / Vincent Rijmen / Q / ARIA / Linear cryptanalysis / S-box / Serpent / XSL attack / Cryptography / Block ciphers / Advanced Encryption Standard

AES and the Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2,3 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
444Q / Block cipher / Twofish / E2 / Field / Linear combination / Key schedule / Rijndael S-box / Cryptography / Advanced Encryption Standard / Serpent

A simple algebraic representation of Rijndael

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2003-08-01 15:27:05
445ICE / Key schedule / Block cipher / Cryptanalysis / Differential of a function / Differential / Boomerang attack / FEAL / Cryptography / Differential cryptanalysis / Feistel cipher

BRICS BRICS RS-95-9

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1996-10-15 07:49:33
446Block ciphers / Differential cryptanalysis / Key schedule / Impossible differential cryptanalysis / Cipher / Linear cryptanalysis / Differential / SHARK / Cryptography / Mathematical analysis / Espionage

Impossible Dif ferential Cryptanalysis of SPN Ciphers Ruilin Li1 , Bing Sun1 and Chao Li1,2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-29 05:10:15
447XTEA / Weak key / Key schedule / Feistel cipher / Ciphertext / Advanced Encryption Standard / Block cipher / Chosen-plaintext attack / Cryptanalysis / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
448Block cipher / Data Encryption Standard / Key schedule / Weak key / Ciphertext / Cryptanalysis / Linear cryptanalysis / ICE / Cipher / Cryptography / Differential cryptanalysis / Advanced Encryption Standard

Narrow-Bicliques: Cryptanalysis of Full IDEA Dmitry Khovratovich1 , Ga¨etan Leurent2 , and Christian Rechberger3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2013-05-03 05:49:35
449KASUMI / Feistel cipher / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / ICE / Key schedule / Linear cryptanalysis / DEAL / Cryptography / MISTY1 / Data Encryption Standard

Supporting Document of MISTY1 Version[removed]Supporting Document of MISTY1

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2006-09-01 06:41:16
450Key schedule / ICE / Decorrelation theory / Block cipher / Advanced Encryption Standard / Boomerang attack / Cryptography / Differential cryptanalysis / DFC

1 On The Decorrelated Fast Cipher (DFC) and Its

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE