DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Square (cipher)
Square (cipher)
Integral Cryptanalysis on Full MISTY1⋆
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree
Performance Analysis of Advanced Encryption Standard (AES) S-Boxes
Optimization and Guess-Then-Solve Attacks in Cryptanalysis
1. Classical Cryptography
Discrete Square Roots Cryptosystems Rabin Cryptosystem
On Constructions of MDS Matrices from Circulant-Like Matrices for Lightweight Cryptography
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and Secret Spns
New Directions in Cryptanalysis of Block Ciphers
On the Interpolation Attacks on Block Ciphers 111
Integral Cryptanalysis
Impossible Differential Cryptanalysis of ARIA and Camellia
The Rijndael Block Cipher, Other Than Encryption
Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 by 6 Matrix with Five Iteration Steps and Its Implementation in C/C++
Linear Cryptanalysis Combined Attack on Cryptographic Security System
A Transpositional Advanced Encryption Standard (Aes) Resists 3-Round Square Attack
AN OVERVIEW of CRYPTANALYSIS on AES Km
Collection of Tolkien Filksongs
Top View
TWINE: a Lightweight, Versatile Block Cipher
Software Implementations and Applications of Elliptic Curve Cryptography
Data Security Using DNA & Amino Acids with Four Square Cipher
Differential-Linear Cryptanalysis Revisited
Finding Integral Distinguishers with Ease
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
Improved Impossible Differential Cryptanalysis of Large-Block Rijndael
Section Sixteen
Applications of Design Theory for the Constructions of MDS Matrices for Lightweight Cryptography
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
New Combined Attacks on Block Ciphers
Twofish: a 128-Bit Block Cipher
A Survey on the Cryptanalysis of the Advanced Encryption Standard
An Overview of Cryptanalysis Research for the Advanced
Related-Key Rectangle Attack on 42-Round SHACAL-2
Security Enhancement of Hill Cipher by Using Non-Square Matrix Approach M
Shhhhh! a History of Written Secrets
Cryptanalysis of Modular Exponentiation Outsourcing Protocols Charles Bouillaguet, Florette Martinez, Damien Vergnaud