51![Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡ Twofish: A 128-Bit Block Cipher Bruce Schneier∗ John Kelsey† Doug Whiting‡](https://www.pdfsearch.io/img/3061a2a7c7232c5e9575752345f8435e.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|
52![Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt Block ciphers sensitive to Gr¨ obner Basis Attacks Johannes Buchmann, Andrei Pychkine, Ralf-Philipp Weinmann {buchmann,pychkine,weinmann}@cdc.informatik.tu-darmstadt.de Technische Universit¨ at Darmstadt](https://www.pdfsearch.io/img/0234a319632fb24a3b3efbfa49752d03.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-06-27 11:00:28
|
---|
53![Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College, Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,](https://www.pdfsearch.io/img/a77cda280ec40dd3198cc07928119e97.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-01-17 09:45:21
|
---|
54![On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi](https://www.pdfsearch.io/img/c3520cbcd198bbd1b9c57627775e2140.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-10-12 12:17:42
|
---|
55![Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin1 , Val´erie Nachef2 , and Cˆome Berbain3 1 Universit´e de Versailles 45 avenue des Etats-Unis, 78035 Versailles Cedex, France Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions Jacques Patarin1 , Val´erie Nachef2 , and Cˆome Berbain3 1 Universit´e de Versailles 45 avenue des Etats-Unis, 78035 Versailles Cedex, France](https://www.pdfsearch.io/img/d285fd0f9626273bc99282cb678a50b0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-04-05 08:31:35
|
---|
56![A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu](https://www.pdfsearch.io/img/564b3735794e9ce28a8cf241694c0e40.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-08-22 14:42:30
|
---|
57![I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms](https://www.pdfsearch.io/img/01189f1e16e55ddb9b534e8cf98a9f10.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-17 08:53:09
|
---|
58![Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine](https://www.pdfsearch.io/img/2833ff230f33298b102bd04f6bd1fc1f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-16 10:47:29
|
---|
59![Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1 Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1](https://www.pdfsearch.io/img/8a4984c07410cd74ee03749806645db6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-08-22 12:08:36
|
---|
60![A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University](https://www.pdfsearch.io/img/a97bde97adb737e333a1b7e1fddbd744.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-09-06 23:14:46
|
---|