by
Nakahara Jr., Jorge. author.
Format:
Electronic Resources
Excerpt:
the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of
by
Lin, Dongdai. editor.
Format:
Electronic Resources
Excerpt:
papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic
View Other Search Results
by
Dobbertin, Hans. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers.
by
Lucks, Stefan. editor.
Format:
Electronic Resources
Excerpt:
Block Ciphers with Several Known Plaintexts -- Combiner Driven Management Models and Their Applications
by
Biryukov, Alex. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptanalysis of FORK-256 -- The Grindahl Hash Functions -- Stream Ciphers Cryptanalysis (I) -- Overtaking VEST
by
Dawson, Ed. editor.
Format:
Electronic Resources
Excerpt:
Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers
by
Smart, Nigel. editor.
Format:
Electronic Resources
Excerpt:
Construction -- A New Mode of Operation for Block Ciphers and Length-Preserving MACs -- Security/Efficiency
by
Naor, Moni. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py
by
Rhee, Min Surp. editor.
Format:
Electronic Resources
Excerpt:
-- Hashing with Polynomials -- Birthday Paradox for Multi-collisions -- Block and Stream Ciphers -- New
by
Gilbert, Henri. editor.
Format:
Electronic Resources
Excerpt:
Multiplication mod 2 n with a Boolean Function -- Block Ciphers I -- New Combined Attacks on Block Ciphers
by
Vaudenay, Serge. editor.
Format:
Electronic Resources
Excerpt:
-- Pseudorandomness -- A Proof of Security in O(2 n ) for the Benes Scheme -- Analysis of Stream Ciphers -- Yet
by
Won, Dong Ho. editor.
Format:
Electronic Resources
Excerpt:
Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I
Limit Search Results
Narrowed by: