Key schedule

Results: 499



#Item
451Block cipher / LEX / Key schedule / VEST / ARIA / QUAD / XSL attack / Grain / Cryptography / Stream ciphers / Advanced Encryption Standard

Algebraic Cryptanalysis of a Small-Scale Version of Stream Cipher LEX Vesselin Velichkov

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
452Clear Channel Communications / Fox Broadcasting Company / Fox Entertainment Group / Metromedia / Fox Sports / Ultimate Fighting Championship / Speed / Fox Deportes / Television in the United States / News Corporation / Sports media

T-MINUS 100 DAYS & COUNTING TO LAUNCH OF FOX SPORTS 1 Day 1 Schedule Set; Key Talent Hires Made; New Programs Developing

Add to Reading List

Source URL: static.foxsports.com

Language: English - Date: 2013-05-09 12:00:12
453Differential cryptanalysis / Key schedule / Stream ciphers / Serpent / Q / Advanced Encryption Standard / ICE / Cipher / SC2000 / Cryptography / Block ciphers / Linear cryptanalysis

PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-11-09 16:59:40
454Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
455Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2004-12-30 09:37:46
456Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
457Block cipher / Cryptanalysis / Feistel cipher / Key schedule / Tiny Encryption Algorithm / Index of cryptography articles / Encryption by date / Cryptography / CIPHERUNICORN-A / CIPHERUNICORN-E

A Cryptographic Review of Cipherunicorn-E

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
458CRYPTREC / Cryptanalysis / Linear cryptanalysis / Advanced Encryption Standard / Block cipher / Key schedule / Cryptography / CIPHERUNICORN-A / CIPHERUNICORN-E

A Cryptographic Review of Cipherunicorn-A M.J.B. Robshaw

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
459Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

1 New Weak-Key Classes of IDEA

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
460Differential cryptanalysis / Blowfish / SAFER / ICE / Key schedule / Linear cryptanalysis / SXAL/MBAL / Q / S-box / Cryptography / Block ciphers / SHARK

1 The Cipher SHARK

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE