Permutation cipher

Results: 61



#Item
11Block ciphers / Lucifer / Cipher / Symmetric-key algorithm / DEAL / Format-preserving encryption / Substitution-permutation network / Cryptography / Data Encryption Standard / Feistel cipher

Lecture 3: Block Ciphers and the Data Encryption Standard Lecture Notes on “Computer and Network Security” by Avi Kak () March 6, 2015 1:24pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-03-06 14:47:12
12Cycle / Transposable element / Transposition cipher / Evolution / Permutation pattern / Permutations / Mathematics / Permutation

A new and faster method of sorting by transpositions Maxime Benoˆıt-Gagne´ et Sylvie Hamel ´ ´ Departement

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2007-07-27 14:38:37
13Constrained writing / Word square / Classical cipher / Computer programming / Computing / Software engineering

- APPENDIX 2B PROGRAMME RULES A single s e a r c h consists of an exhaustive permutation (as far as the s y s t e m p e r m i t s ) of any given combination of e l e m e n t s .

Add to Reading List

Source URL: sigir.org

Language: English - Date: 2008-09-08 13:24:52
14Random permutation / Pseudorandom permutation / Permutation / Block cipher / FO / Distinguishing attack / Mathematics / Combinatorics / Advantage

XLS is not a Strong Pseudorandom Permutation Mridul Nandi Indian Statistical Institute, Kolkata , Abstract. In FSE 2007, Ristenpart and Rogaway had described a generic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-09 03:16:12
15Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
16Permutation / Mihir Bellare / Inverse function / Inverse / Function / Lucifer / Format-preserving encryption / Advantage / Cryptography / Mathematics / Block cipher

BLOCK CIPHERS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-02 14:28:56
17Permutation / Cipher / Chosen-plaintext attack / ICE / Cryptanalysis / Block cipher / Data Encryption Standard / Cryptography / Stream ciphers / Ciphertext

C:~hookleeMy ProgramsMATLABHCIEdiff_hist.eps

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-06 07:14:59
18Abstract algebra / Linear algebra / Matrix / Function / Feistel cipher / Pseudorandom permutation / Vector space / Algebra / Mathematics / Functions and mappings

On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes Mridul Nandi Indian Statistical Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 03:14:54
19Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
20CBC-MAC / CMAC / Block cipher / Pseudorandom function family / Feistel cipher / Pseudorandomness / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2001-09-12 12:24:34
UPDATE