Differential cryptanalysis

Results: 238



#Item
101Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:28:42
102Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
103Copyright 2004, The Mathematical Association of America. All rights reserved. First published in the American Mathematical Monthly. Reprinted by permission. Polynomials in the Nation’s Service: Using Algebra to Design

Copyright 2004, The Mathematical Association of America. All rights reserved. First published in the American Mathematical Monthly. Reprinted by permission. Polynomials in the Nation’s Service: Using Algebra to Design

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2009-07-26 21:30:18
1041  On the Optimality of Differential Fault Analyses on CLEFIA ´ Juliane Kr¨amer, Anke St¨uber, Agnes

1 On the Optimality of Differential Fault Analyses on CLEFIA ´ Juliane Kr¨amer, Anke St¨uber, Agnes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 03:54:34
105Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US  Abstract

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-18 13:28:11
106COMP4140 Introduction to Cryptography and Cryptosystems

COMP4140 Introduction to Cryptography and Cryptosystems

Add to Reading List

Source URL: www.cs.umanitoba.ca

Language: English - Date: 2007-11-06 12:31:11
107Microsoft Office Outlook - Memo Style

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:26:50
108M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed]Low Cost Attacks on Tamper Resistant Devices Ross

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
109Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
110Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Segmented Integer Counter Mode: Specification and Rationale David A. McGrew Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA[removed]October 19, 2000

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2000-10-19 13:37:14