<--- Back to Details
First PageDocument Content
Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / XTEA / ICE / SHACAL / International Data Encryption Algorithm / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / Cryptography / Block ciphers / Data Encryption Standard
Tiny Encryption Algorithm
University of Cambridge Computer Laboratory
XTEA
ICE
SHACAL
International Data Encryption Algorithm
Advanced Encryption Standard
Differential cryptanalysis
Key schedule
Cryptography
Block ciphers
Data Encryption Standard

Add to Reading List

Source URL: jiqiang.googlepages.com

Download Document from Source Website

Share Document on Facebook

Similar Documents

University of Cambridge Computer Laboratory / Data Encryption Standard / ICE / Bitwise operation / XXTEA / Cryptographic hash functions / XTEA / Cryptography / Binary arithmetic / Tiny Encryption Algorithm

TEA, a Tiny Encryption Algorithm David J. Wheeler Roger M. Needham Computer Laboratory Cambridge University England

DocID: 18bJt - View Document

Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

DocID: 12IAH - View Document

Computer file formats / Dynamic-link library / Hooking / XTEA / Tiny Encryption Algorithm / Portable Executable / Library / Computer virus / Malware / Computing / Software / System software

Analysis of Banking Trojan Vawtrak White Paper AVG Technologies, Virus Lab

DocID: W5d3 - View Document

qt{s|}xty} zu rtsw}v P[XeX TeX g[\aZf g[Tg lbh VTa Wb gb `T^X \g XTf\Xe Ybe lbhe UTUl gb WXiX_bc ZbbW f_XXc [TU\gf TaW _XTea gb f_XXc \aWXcXaWXag_l4 Pb UX TU_X gb Wb g[Tg2 lbh j\__ aXXW gb haWXefgTaW lbhe UTUl0f f_XXc4

DocID: TkSd - View Document

Stream ciphers / Differential cryptanalysis / Boomerang attack / Block cipher / E0 / XTEA / Linear feedback shift register / Constraint programming / Salsa20 / Cryptography / Pseudorandom number generators / SHACAL

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

DocID: w83j - View Document