Block cipher

Results: 1020



#Item
41Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
42International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

Add to Reading List

Source URL: www.tmrfindia.org

Language: English
43Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
44A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
45Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs  Rutgers University

Leakage-Abuse Attacks Against Searchable Encryption David Cash Paul Grubbs Rutgers University

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2015-10-18 00:55:12
46A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway†  June 17, 2003

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
47Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:42
48On the Security of Intra-Car Wireless Sensor Networks

On the Security of Intra-Car Wireless Sensor Networks

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Language: English - Date: 2014-04-11 22:39:21
49Modern Cryptography M. Edwards Recap Evolution of Cryptography

Modern Cryptography M. Edwards Recap Evolution of Cryptography

Add to Reading List

Source URL: xn--bta-yla.net

Language: English - Date: 2014-12-31 11:24:35
50Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del

Francisco Rodriguez-Henriquez, Centro de Investigación y de Estudios Avanzados del IPN (CINVESTAV), Col. San Pedro Zacatenco, Mexico D.F., Mexico; Nazar Abbas Saqib, Centro de Investigación y de Estudios Avanzados del

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2007-02-03 23:20:56