DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Cryptography
Cryptography
A Quantitative Study of Advanced Encryption Standard Performance
Constructing Low-Weight Dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform Claude Carlet and Xi Chen*
Ohio IT Standard ITS-SEC-01 Data Encryption and Cryptography
State of the Art in Lightweight Symmetric Cryptography
Construction of Stream Ciphers from Block Ciphers and Their Security
Chapter 2 the Data Encryption Standard (DES)
Implementation of Advanced Encryption Standard Algorithm
Implementation of Advanced Encryption Standard Algorithm With
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Security Evaluation of Cryptographic Technology Security Estimation Of
Recommendation for Block Cipher Modes of Operation
(Advance Encryption Scheme (AES)) and Multicrypt Encryption Scheme
Data Encryption Standard (DES)
CRYPTREC Report 2001
Optimizing Authenticated Encryption Algorithms
T-79.503 Cryptography and Data Security
Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College,
[email protected]
Nist Sp 800-38D
Top View
Bad Cryptography Bruce Barnett Who Am I?
FIPS 46-3, Data Encryption Standard
How to Evaluate the Security of Real-Life Cryptographic Protocols? the Cases of ISO/IEC 29128 and CRYPTREC
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions
CSC 580 Cryptography and Computer Security
The Entropy Problem
Key Management Systems at the Cloud Scale
A Comparative Survey on Symmetric Key Encryption Algorithms
Japan CRYPTREC Activity on Lightweight Cryptography
Construction of Correlation Immune Boolean Functions*
Analysis of RC2
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
On the Security of the CCM Encryption Mode and of a Slight Variant Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sebastien Zimmer
New Directions in Cryptography
Learning Correct Cryptography by Example — Seth James Nielson Christopher K
An Introduction to Cryptography Version Information an Introduction to Cryptography, Version 8.0
A Pros and Cons of Block Cipher Modes for Symmetric Key Algorithms
AVR2027: AES Security Module