Block ciphers

Results: 398



#Item
81

PDF Document

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-05-01 12:15:32
82

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
83Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1  University of Passau, Germany

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol Philipp Jovanovic1 and Samuel Neves2 1 University of Passau, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 05:15:53
84Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Differential Attacks on Generalized Feistel Schemes Val´erie Nachef1 ,and Emmanuel Volte1 ,Jacques Patarin2 Department of Mathematics University of Cergy-Pontoise CNRS UMR 8088

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-26 13:35:03
85J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER  Introduction to differential power analysis

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
86Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Key Escrow from a Safe Distance Looking Back at the Clipper Chip Matt Blaze University of Pennsylvania

Add to Reading List

Source URL: www.crypto.com

Language: English - Date: 2011-11-03 20:44:47
87Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1  Center for Information Security Technologies(CIST), Korea University, Kore

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
88On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

On the Security of RC4 in TLS Nadhem AlFardan, Royal Holloway, University of London; Daniel J. Bernstein, University of Illinois at Chicago and Technische Universiteit Eindhoven; Kenneth G. Paterson, Bertram Poettering,

Add to Reading List

Source URL: 0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com

Language: English - Date: 2013-09-28 18:46:16
89Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:09:55
90Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1  State Key Laboratory of Information Security, Institute of Information Eng

Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 22:05:20