1![Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier† Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†](https://www.pdfsearch.io/img/86c433158da91b05b94d45f8cbf0af0a.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|
2![Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa Improved Cryptanalysis of Rijndael Niels Ferguson1 , John Kelsey1 , Stefan Lucks?2 , Bruce Schneier1 , Mike Stay3 , David Wagner4 , and Doug Whiting5 1 Counterpane Internet Security, Inc., 3031 Tisch Way Suite 100PE, Sa](https://www.pdfsearch.io/img/c3b053bef48699d1d3703e82e6dfa0ad.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|
3![On the Two
sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two
sh is a new block cipher with a 128 bit block, and a On the Two
sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two
sh is a new block cipher with a 128 bit block, and a](https://www.pdfsearch.io/img/c1e29958a9ad447f233feca65c83b4fb.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:31
|
---|
4![Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1 Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1](https://www.pdfsearch.io/img/0ec3c5101975b9d0a9caf78b57565ce4.jpg) | Add to Reading ListSource URL: www.ssi.gouv.frLanguage: English - Date: 2012-11-06 05:29:21
|
---|
5![1 The Cipher SHARK 1 The Cipher SHARK](https://www.pdfsearch.io/img/6b0ead4862b72949f86748a75c6692f8.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English |
---|