<--- Back to Details
First PageDocument Content
NIST hash function competition / Keccak / Joan Daemen / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / Permutation / Linear cryptanalysis / Cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2013-02-27 15:26:40
NIST hash function competition
Keccak
Joan Daemen
Block cipher
Differential cryptanalysis
Advanced Encryption Standard
Permutation
Linear cryptanalysis
Cryptanalysis
Cryptography
Error detection and correction
Cryptographic hash functions

Add to Reading List

Source URL: keccak.noekeon.org

Download Document from Source Website

File Size: 1,01 MB

Share Document on Facebook

Similar Documents

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document

Cryptanalysis of TWIS Block Cipher ¨ Onur Ko¸cak and Ne¸se Oztop Institute of Applied Mathematics, Middle East Technical University, Turkey {onur.kocak,noztop}@metu.edu.tr

DocID: 1uxNp - View Document

Improved Linear Cryptanalysis of SMS4 Block Cipher

DocID: 1umoL - View Document

An Algebraic Fault Attack on the LED Block Cipher P. Jovanovic, M. Kreuzer and I. Polian Fakult¨ at f¨ ur Informatik und Mathematik

DocID: 1tcCJ - View Document

Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Authenticated encryption / Initialization vector / Ciphertext indistinguishability / Cryptographic nonce / Advantage

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document