Block cipher

Results: 1020



#Item
81Block cipher / Trischen

Diss. ETH NoInformation-Theoretic Analyses of Symmetric-Cryptography Constructions in Idealized Models A dissertation submitted to

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:56:35
82Cryptography / Block cipher / Advantage / Pseudorandom permutation / Data Encryption Standard / Feistel cipher / Stream ciphers / Distinguishing attack / Exclusive or / Advanced Encryption Standard / Running key cipher / One-way compression function

Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers Peter Gaˇzi ETH Zurich, Switzerland Department of Computer Science

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 16:51:50
83Cryptography / Private information retrieval / Oblivious transfer / VEST / Power dividers and directional couplers / Cryptographic primitive / Block cipher / Pir / X Window System / Commitment scheme

LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:36:31
84Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
85Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
86

A Traceable Block Cipher Olivier Billet, Henri Gilbert Content Distribution Context M

Add to Reading List

Source URL: conf.ncku.edu.tw

Language: English - Date: 2003-12-21 20:15:05
    87Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

    Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-06-19 17:26:59
    88

    Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV J. Black ∗ P. Rogaway

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:04:54
      89Cryptography / Transport Layer Security / Cryptographic protocols / Cryptographic software / Internet protocols / Secure communication / Padding oracle attack / Block cipher mode of operation / Padding / Authenticated encryption / OpenSSL / CRIME

      Lucky Thirteen: Breaking the TLS and DTLS Record Protocols Nadhem J. AlFardan and Kenneth G. Paterson∗ Information Security Group Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK {nadhem.alfardan.2009,

      Add to Reading List

      Source URL: tls.mbed.org

      Language: English - Date: 2016-01-19 07:39:30
      UPDATE