MISTY1

Results: 25



#Item
1Rump-Programme.txt  Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

Rump-Programme.txt Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-05-28 01:20:46
2Misty M. Ferguson Employment Specialist CASY-MSCCN Misty M. Ferguson is currently serving as an Employment Specialist for Corporate America Supports You (CASY) and the Military Spouses Corporate

Misty M. Ferguson Employment Specialist CASY-MSCCN Misty M. Ferguson is currently serving as an Employment Specialist for Corporate America Supports You (CASY) and the Military Spouses Corporate

Add to Reading List

Source URL: www.casy.us

Language: English - Date: 2014-05-26 11:09:45
3Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1  Department of Mathematics

Improved Higher-Order Differential Attacks on MISTY1 Achiya Bar On1? 1 Department of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 07:22:52
4Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1  Department of Mathematics and System Science, Science College,

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
5Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Golden Fish An Intelligent Stream Cipher Fuse Memory Modules

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-16 22:19:01
6Microsoft Word - design_evaluation_report.doc

Microsoft Word - design_evaluation_report.doc

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:53
73-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
83-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
93-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
10A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33