Permutation cipher

Results: 61



#Item
31One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Mathematics / Combinatorics

Stronger Security Bounds for OMAC, TMAC and XCBC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:13:23
32Advanced Encryption Standard / Block cipher / Ciphertext / Cipher / Ciphertext stealing / Substitution-permutation network / Cryptography / Block cipher modes of operation / Initialization vector

The Advanced Encryption Standard Algorithm Validation Suite (AESAVS) November 15, 2002 Lawrence E. Bassham III National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
33Substitution-permutation network / Advanced Encryption Standard / Feistel cipher / Key schedule / VEST / Cipher / ICE / ARIA / CRYPTON / Cryptography / Block ciphers / Stream cipher

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-02-03 09:30:48
34Key schedule / Substitution-permutation network / Feistel cipher / Stream cipher / ARIA / Q / Key whitening / VEST / Cipher / Cryptography / Block ciphers / Advanced Encryption Standard

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:27:20
35Initialization vector / Tiny Encryption Algorithm / Differential cryptanalysis / ICE / Cipher / Substitution-permutation network / Stream cipher / Churning / Cryptography / Block cipher modes of operation / Block ciphers

Related-key Attacks Against Full Hummingbird-2 Markku-Juhani O. Saarinen ? CBEAM [removed] Abstract. We present attacks on full Hummingbird-2 which are able to recover

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-03-11 21:14:42
36Information / Internet protocols / Secure communication / Electronic commerce / Block cipher modes of operation / Transport Layer Security / Padding / Initialization vector / IPsec / Cryptography / Cryptographic protocols / Data

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:16
37ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA[removed]removed]

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:26:34
38GOST / NIST hash function competition / Hashing / Keccak / Advanced Encryption Standard / OpenSSL / Block cipher / Data Encryption Standard / ARIA / Cryptography / GOST standards / Cryptographic hash functions

S TRI B OB : Authenticated Encryption from GOST R[removed]LPS Permutation (Extended Abstract) Markku-Juhani O. Saarinen ∗ Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-05-31 01:59:06
39Advanced Encryption Standard / Substitution-permutation network / Differential cryptanalysis / Permutation / SAFER / Index of cryptography articles / Running key cipher / Cryptography / Block ciphers / Q

Dial C for Cipher Le chiffrement ´ etait presque parfait? Thomas Baign`eres?? and Matthieu Finiasz EPFL CH-1015 Lausanne – Switzerland

Add to Reading List

Source URL: www.baigneres.net

Language: English - Date: 2013-07-24 10:25:38
40ICE / Block cipher / S-box / VEST / Substitution-permutation network / Differential cryptanalysis / Cryptography / Data Encryption Standard / Cryptographic hash functions

PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:40
UPDATE