<--- Back to Details
First PageDocument Content
Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size
Date: 2007-03-29 16:18:56
Cryptography
Stream ciphers
Cryptographic hash functions
Message authentication codes
VEST
A5/1
Data Encryption Standard
Block cipher modes of operation
Confusion and diffusion
Crypt
Rabbit
Key size

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

Add to Reading List

Source URL: www.ecrypt.eu.org

Download Document from Source Website

File Size: 304,36 KB

Share Document on Facebook

Similar Documents

Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

DocID: 1kO65 - View Document

Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

DocID: 1aIMB - View Document

Government / Democracy / Elections / Democratization / Legal reform / E-democracy / Molecular diffusion / Diffusion / Transport phenomena / Politics / Technology

Diffusion or Confusion? International Economic Shocks and Democratization around the World Christian Houle University of Rochester

DocID: 13Oar - View Document

Depth of field / Circle of confusion / Rendering / Partial differential equation / Computer graphics / Pinhole camera model / Miniature faking / Optics / Science of photography / Geometrical optics

Real-time, Accurate Depth of Field using Anisotropic Diffusion and Programmable Graphics Cards Marcelo Bertalm´ıo and Pere Fort Departament de Tecnologia Universitat Pompeu Fabra Abstract

DocID: 11S5c - View Document

Block cipher / Linear cryptanalysis / Confusion and diffusion / Q / Permutation / Ciphertext / Cipher / Substitution cipher / BassOmatic / Cryptography / Mathematics / Substitution-permutation network

Substitution-Permutation Networks and Linear Cryptanalysis

DocID: mJD3 - View Document