XOR cipher

Results: 8



#Item
1Asymmetric encryption with 2 XOR’s: the cipher TCHo Jean-Philippe Aumasson

Asymmetric encryption with 2 XOR’s: the cipher TCHo Jean-Philippe Aumasson

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:47:00
    2From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour Pierre Karpman ´ Inria and Ecole polytechnique, France

    From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour Pierre Karpman ´ Inria and Ecole polytechnique, France

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-15 05:33:19
    3Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Add to Reading List

    Source URL: www.cba.mit.edu

    Language: English - Date: 2011-12-17 09:30:36
    4A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

    A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2005-02-28 15:02:35
    5Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Cryptography with Asynchronous Logic Automata Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld MIT Center for Bits and Atoms, Cambridge, MA

    Add to Reading List

    Source URL: cba.mit.edu

    Language: English - Date: 2011-12-17 09:30:36
    6AxelleApvrille_RuchaNigam-0714.indd

    AxelleApvrille_RuchaNigam-0714.indd

    Add to Reading List

    Source URL: www.virusbtn.com

    Language: English - Date: 2014-07-02 09:45:58
    7Second Modes of Operation Workshop (August[removed]The XCBC-XOR, XECB-XOR and XECB-MAC Modes

    Second Modes of Operation Workshop (August[removed]The XCBC-XOR, XECB-XOR and XECB-MAC Modes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-12-07 13:07:48
    8ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

    ZIP Attacks with Reduced Known Plaintext Michael Stay AccessData Corporation

    Add to Reading List

    Source URL: math.ucr.edu

    Language: English - Date: 2006-03-09 16:25:49