<--- Back to Details
First PageDocument Content
Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / XTEA / ICE / SHACAL / International Data Encryption Algorithm / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / Cryptography / Block ciphers / Data Encryption Standard
Tiny Encryption Algorithm
University of Cambridge Computer Laboratory
XTEA
ICE
SHACAL
International Data Encryption Algorithm
Advanced Encryption Standard
Differential cryptanalysis
Key schedule
Cryptography
Block ciphers
Data Encryption Standard

Add to Reading List

Source URL: jiqiang.googlepages.com

Download Document from Source Website

Share Document on Facebook

Similar Documents

Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

DocID: 1xTE8 - View Document

Cryptography / Data Encryption Standard / Differential cryptanalysis / Linear cryptanalysis / Cryptanalysis / ICE / Differential-linear attack

Chaskey ARX Cryptanalysis Improved Differential-Linear

DocID: 1xT7u - View Document

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

DocID: 1udaS - View Document

Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis Raghavan Kumar$ , Philipp Jovanovice and Ilia Poliane $ University of Massachusetts, 01002 USA

DocID: 1tfZi - View Document

Cryptography / Applied mathematics / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Block cipher / Jean-Charles Faugre / Advanced Encryption Standard / International Cryptology Conference / Linear cryptanalysis / Lattice-based cryptography / Index of cryptography articles

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document