Permutation cipher

Results: 61



#Item
51Abstract algebra / Permutation / Variably Modified Permutation Composition / Field theory / Function / Factorization of polynomials over a finite field and irreducibility tests / ACE Encrypt / Mathematics / Combinatorics / Cryptography

VMPC One-Way Function and Stream Cipher Bartosz Zoltak http://www.vmpcfunction.com

Add to Reading List

Source URL: www.vmpcfunction.com

Language: English - Date: 2005-01-17 15:36:11
52Electronic commerce / RSA / Key management / Optimal asymmetric encryption padding / PKCS1 / Key size / Block cipher / PKCS / Ø / Cryptography / Public-key cryptography / Cryptography standards

The RSA one way permutation Ø

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-09 14:25:34
53ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation

Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2

Add to Reading List

Source URL: wiki-files.aircrack-ng.org

Language: English - Date: 2012-12-01 17:41:53
54Integer sequences / Number theory / Partition / Big O notation / Permutation / Time complexity / Classical cipher / Ordered partition of a set / Mathematics / Combinatorics / Analysis of algorithms

PDF Document

Add to Reading List

Source URL: www.site.uottawa.ca

Language: English - Date: 2004-07-17 13:26:05
55Linear cryptanalysis / S-box / Lucifer / Cryptanalysis / Ciphertext / Confusion and diffusion / Chosen-plaintext attack / Differential cryptanalysis / ICE / Cryptography / Substitution-permutation network / Block cipher

PDF Document

Add to Reading List

Source URL: www.engr.mun.ca

Language: English - Date: 2004-06-22 10:36:18
56CBC-MAC / CMAC / Block cipher / Feistel cipher / Pseudorandomness / Pseudorandom permutation / Pseudorandom function family / Unpredictable permutation / Index of cryptography articles / Cryptography / Message authentication codes / Advantage

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2005-04-04 15:10:03
57NIST hash function competition / Keccak / Joan Daemen / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / Permutation / Linear cryptanalysis / Cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
58Pseudorandom number generators / Randomness / RC4 / Combinatorics / Random permutation / Advantage / Stream cipher / Pseudorandomness / Markov chain / Cryptography / Mathematics / Permutations

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-06-01 07:12:43
59Pseudorandomness / Feistel cipher / ICE / Block cipher / Pseudorandom function family / Commitment scheme / Advantage / Exclusive or / Optimal asymmetric encryption padding / Cryptography / Permutations / Unpredictable permutation

PDF Document

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2006-11-27 11:45:50
60Avalanche effect / Cryptographic hash function / Random permutation / Cryptanalysis / Pseudorandom permutation / Advantage / Cryptography / Permutations / Block cipher

PDF Document

Add to Reading List

Source URL: 163.117.174.60

Language: English - Date: 2010-04-12 08:03:04
UPDATE