<--- Back to Details
First PageDocument Content
Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers
Date: 2006-03-10 16:40:02
Block cipher
Differential cryptanalysis
Tiger
Py
Eli Biham
Advanced Encryption Standard
Cryptanalysis
MD4
Index of cryptography articles
Cryptography
Cryptographic hash functions
Stream ciphers

FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 50,53 KB

Share Document on Facebook

Similar Documents

Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

CP-G10i-Flyer-v10.fh-2 [Converted]

DocID: 1rapN - View Document

Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document

Cryptography / Public-key cryptography / Undeniable signature / Digital signature / RSA / David Chaum / Group signature / Ring signature / Index of cryptography articles

Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.

DocID: 1qL92 - View Document

Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1q9PC - View Document

Cryptography / Public-key cryptography / Elliptic curve cryptography / Finite fields / Elliptic curve / RSA Security / National Security Agency / Index of cryptography articles / Book:Cryptography

Algorithmic number theory and cryptography — Comité des projets, Bordeaux Damien R󰀻󰀮󰀱󰀾󰁀 Équipe LFANT, Inria Bordeaux Sud-Ouest

DocID: 1q3yF - View Document