<--- Back to Details
First PageDocument Content
Linear cryptanalysis / S-box / Lucifer / Cryptanalysis / Ciphertext / Confusion and diffusion / Chosen-plaintext attack / Differential cryptanalysis / ICE / Cryptography / Substitution-permutation network / Block cipher
Date: 2004-06-22 10:36:18
Linear cryptanalysis
S-box
Lucifer
Cryptanalysis
Ciphertext
Confusion and diffusion
Chosen-plaintext attack
Differential cryptanalysis
ICE
Cryptography
Substitution-permutation network
Block cipher

Add to Reading List

Source URL: www.engr.mun.ca

Download Document from Source Website

File Size: 336,15 KB

Share Document on Facebook

Similar Documents

Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

DocID: 1kO65 - View Document

Cipher / Confusion and diffusion / Twofish / Substitution-permutation network / Data Encryption Standard / Cryptography / Block ciphers / Feistel cipher

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

DocID: 1aIMB - View Document

Government / Democracy / Elections / Democratization / Legal reform / E-democracy / Molecular diffusion / Diffusion / Transport phenomena / Politics / Technology

Diffusion or Confusion? International Economic Shocks and Democratization around the World Christian Houle University of Rochester

DocID: 13Oar - View Document

Depth of field / Circle of confusion / Rendering / Partial differential equation / Computer graphics / Pinhole camera model / Miniature faking / Optics / Science of photography / Geometrical optics

Real-time, Accurate Depth of Field using Anisotropic Diffusion and Programmable Graphics Cards Marcelo Bertalm´ıo and Pere Fort Departament de Tecnologia Universitat Pompeu Fabra Abstract

DocID: 11S5c - View Document

Block cipher / Linear cryptanalysis / Confusion and diffusion / Q / Permutation / Ciphertext / Cipher / Substitution cipher / BassOmatic / Cryptography / Mathematics / Substitution-permutation network

Substitution-Permutation Networks and Linear Cryptanalysis

DocID: mJD3 - View Document