<--- Back to Details
First PageDocument Content
Data Encryption Standard / Differential cryptanalysis / ICE / Piling-up lemma / Q / Advanced Encryption Standard / Substitution-permutation network / Key schedule / S-box / Cryptography / Block ciphers / Linear cryptanalysis
Date: 2004-04-29 17:27:30
Data Encryption Standard
Differential cryptanalysis
ICE
Piling-up lemma
Q
Advanced Encryption Standard
Substitution-permutation network
Key schedule
S-box
Cryptography
Block ciphers
Linear cryptanalysis

Add to Reading List

Source URL: www.engr.mun.ca

Download Document from Source Website

File Size: 176,64 KB

Share Document on Facebook

Similar Documents

On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN Karthikeyan Bhargavan Inria, France

DocID: 1xUjo - View Document

Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Block cipher / Data Encryption Standard / RC5 / Cryptanalysis / Keyword cipher / Churning / CPC Binary Barcode

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

DocID: 1xTge - View Document

Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince Yarkın Dor¨oz, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute {ydoroz,ashahverdi,teisenbarth,sunar}@wpi.edu

DocID: 1vkBl - View Document

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers Gregory V. Bard1⋆ , Nicolas T. Courtois2 , Jorge Nakahara Jr3⋆⋆ , Pouyan Sepehrdad3, and Bingsheng Zhang4⋆ ⋆ ⋆ 1

DocID: 1vajY - View Document

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document