Permutation cipher

Results: 61



#Item
41Optimal asymmetric encryption padding / RSA / Padding / Block cipher / Cipher / Random oracle / Cryptography / Public-key cryptography / Signcryption

Optimal Signcryption from Any Trapdoor Permutation Yevgeniy Dodis† Michael J. Freedman† Stanislaw Jarecki‡

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:05:14
42Permutations / Feistel cipher / SIMD / Parity of a permutation / Mathematics / Combinatorics / Computing

Tweaking SIMD Gaëtan Leurent, Pierre-Alain Fouque, Charles Bouillaguet École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-09-21 12:40:43
43Cipher / Algorithm / Triple DES / MAD / Permutation / Crypt / Cryptography / Data Encryption Standard / Block cipher modes of operation

NIST Special Publication[removed], Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-10 13:37:56
44Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
45Grøstl / SHA-1 / Advanced Encryption Standard / SHA-2 / Tiger / MD5 / Hash function / Permutation / Block cipher / Error detection and correction / Cryptographic hash functions / Cryptography

Grøstl – a SHA-3 candidate ∗

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:38
46Cryptographic hash functions / Pseudorandomness / Permutations / Pseudorandom permutation / Advantage / Block cipher / Random permutation / Universal hashing / Feistel cipher / Cryptography / Search algorithms / Hashing

A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation M´etodo Gen´erico para Extender el Espacio del Mensaje de una Permutaci´on Pseudo-aleatoria

Add to Reading List

Source URL: www.scielo.org.mx

Language: English - Date: 2010-01-06 17:07:45
47Permutation / Mathematics / Data Encryption Standard / Unpredictable permutation / Feistel cipher / Feistel / E2

Lai-Massey Scheme and Quasi-Feistel Networks (Extended Abstract) Aaram Yun1 , Je Hong Park2 , and Jooyoung Lee2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-09-04 12:27:38
48CMAC / Cryptographic hash functions / Tiny Encryption Algorithm / VMAC / Padding / Block cipher modes of operation / Block cipher / Permutation / Universal hashing / Cryptography / Message authentication codes / Mathematics

CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions J. Black ∗

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2003-12-03 13:40:14
49One-key MAC / Block cipher modes of operation / Permutation / Block cipher / CMAC / Message authentication codes / Combinatorics / Mathematics

Stronger Security Bounds for OMAC, TMAC and XCBC Tetsu Iwata

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2003-08-12 06:18:36
50Mathematics / Estimation theory / Symbol / Orbifold / Differential cryptanalysis / Linear cryptanalysis / Permutation

1 The Block Cipher Square

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE