Differential cryptanalysis

Results: 238



#Item
141Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
142Institute for Applied Information Processing and Communications / SHA-1 / Differential cryptanalysis / Krypto / Vincent Rijmen / Hash function / Cryptanalysis / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - RecentAttacks_talk2

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
143VEST / Cipher / Block cipher / Differential cryptanalysis / Key size / ESTREAM / Phelix / Grain / Stream ciphers / Cryptography / Py

The Truth on TPy Eli Biham∗

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2008-02-29 12:28:09
144Py / Block size / Data Encryption Standard / Differential cryptanalysis / Cipher / ICE / Advanced Encryption Standard / Block ciphers / MULTI2 / Cryptography / Stream ciphers / Blowfish

© 1995 Michael Paul Johnson The Diamond2 Block Cipher

Add to Reading List

Source URL: www.cygnusproductions.com

Language: English - Date: 2007-05-23 11:40:44
145Differential cryptanalysis / Slide attack / DES-X / Chosen-plaintext attack / Cryptanalysis / RSA / Ciphertext / Tiny Encryption Algorithm / Cryptography / Data Encryption Standard / Public-key cryptography

Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman1,2 , Nathan Keller2 , and Adi Shamir2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-10-02 05:38:38
146SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-03-19 02:03:06
147Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: tnlandforms.us

Language: English - Date: 2004-12-30 09:37:46
148Tiny Encryption Algorithm / Cipher / Block cipher / Stream cipher / Impossible differential cryptanalysis / Chosen-plaintext attack / Differential cryptanalysis / International Data Encryption Algorithm / Cryptanalysis / Cryptography / XTEA / Symmetric-key algorithm

A CRYPTANALYSIS OF THE TINY ENCRYPTION ALGORITHM

Add to Reading List

Source URL: www.csshl.net

Language: English - Date: 2011-10-26 10:07:40
149Advanced Encryption Standard / MISTY1 / Triple DES / Block cipher / Horst Feistel / Feistel / Differential cryptanalysis / Camellia / Encryption by date / Cryptography / Data Encryption Standard / Feistel cipher

1 1

Add to Reading List

Source URL: www.ieice-hbkb.org

Language: English - Date: 2011-03-11 03:25:27
150Stream ciphers / Impossible differential cryptanalysis / Block cipher / XTEA / Cryptanalysis / Tiny Encryption Algorithm / Cipher / Decorrelation theory / VEST / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Zero Correlation Linear Cryptanalysis with Reduced Data Complexity Andrey Bogdanov1 and Meiqin Wang1,2

Add to Reading List

Source URL: www2.compute.dtu.dk

Language: English - Date: 2012-09-07 13:56:33
UPDATE