<--- Back to Details
First PageDocument Content
Cryptography / Block cipher modes of operation / Block cipher / Chosen-plaintext attack / Authenticated encryption / Cryptanalysis / Galois/Counter Mode / Chosen-ciphertext attack / Advanced Encryption Standard / OCB mode / Data Encryption Standard / Book:Cryptography 1
Date: 2018-06-14 07:12:36
Cryptography
Block cipher modes of operation
Block cipher
Chosen-plaintext attack
Authenticated encryption
Cryptanalysis
Galois/Counter Mode
Chosen-ciphertext attack
Advanced Encryption Standard
OCB mode
Data Encryption Standard
Book:Cryptography 1

Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble Thomas Fuhr1 , Ga¨etan Leurent2 , Valentin Suder3 1 ANSSI, France

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 416,90 KB

Share Document on Facebook

Similar Documents

Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE)  My Job

Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE) My Job

DocID: 1uHA7 - View Document

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

DocID: 1qPG1 - View Document

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

Network Working Group Request for Comments: 2246 Category: Standards Track T. Dierks Certicom

DocID: 1pAhq - View Document

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

DocID: 1pl66 - View Document

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

DocID: 1pgES - View Document