<--- Back to Details
First PageDocument Content
Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard
Date: 2013-08-28 07:53:28
Cryptography
Block ciphers
GOST standards
Differential cryptanalysis
Linear cryptanalysis
Interpolation attack
International Data Encryption Algorithm
Data Encryption Standard
GOST
Key schedule
PRESENT
Advanced Encryption Standard

Add to Reading List

Source URL: jda.noekeon.org

Download Document from Source Website

File Size: 202,61 KB

Share Document on Facebook

Similar Documents

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

DocID: 1xUjo - View Document

Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Block cipher / Data Encryption Standard / RC5 / Cryptanalysis / Keyword cipher / Churning / CPC Binary Barcode

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

DocID: 1xTge - View Document

Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

DocID: 1vkBl - View Document

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard1⋆ , Nicolas T. Courtois2 , Jorge Nakahara Jr3⋆⋆ , Pouyan Sepehrdad3, and Bingsheng Zhang4⋆ ⋆ ⋆ 1

DocID: 1vajY - View Document

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document