DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  ARIA (cipher)

ARIA (cipher)

  • Authentication Key Recovery on Galois/Counter Mode (GCM)

    Authentication Key Recovery on Galois/Counter Mode (GCM)

  • Impossible Differential Cryptanalysis of Reduced Round Hight

    Impossible Differential Cryptanalysis of Reduced Round Hight

  • Security Enhancement in Cloud Storage Using ARIA and Elgamal Algorithms

    Security Enhancement in Cloud Storage Using ARIA and Elgamal Algorithms

  • ARIA-CTR Encryption for Low-End Embedded Processors

    ARIA-CTR Encryption for Low-End Embedded Processors

  • Cryptanalysis of Selected Block Ciphers

    Cryptanalysis of Selected Block Ciphers

  • Encryption Block Cipher

    Encryption Block Cipher

  • Cryptanalysis of Block Ciphers

    Cryptanalysis of Block Ciphers

  • S-Box Construction Based on Linear Fractional Transformation and Permutation Function

    S-Box Construction Based on Linear Fractional Transformation and Permutation Function

  • Multidimensional Differential-Linear Cryptanalysis of ARIA Block Cipher

    Multidimensional Differential-Linear Cryptanalysis of ARIA Block Cipher

  • Analysis of Linear Relationships in Block Ciphers

    Analysis of Linear Relationships in Block Ciphers

  • Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES

    Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES

  • Attacking Reduced Rounds of the ARIA Block Cipher

    Attacking Reduced Rounds of the ARIA Block Cipher

  • ARIA/AES 기반 GCM 인증암호를 지원하는 암호 프로세서 a Cryptographic Processor Supporting ARIA/AES-Based GCM Authenticated Encryption

    ARIA/AES 기반 GCM 인증암호를 지원하는 암호 프로세서 a Cryptographic Processor Supporting ARIA/AES-Based GCM Authenticated Encryption

  • Impossible Differential Cryptanalysis of ARIA and Camellia

    Impossible Differential Cryptanalysis of ARIA and Camellia

  • Implementation of ARIA Cryptographic Modules Based on ARM9 Devices

    Implementation of ARIA Cryptographic Modules Based on ARM9 Devices

  • Cryptanalysis and Design of Symmetric Primitives

    Cryptanalysis and Design of Symmetric Primitives

  • An Overview of Cryptography (Updated Version, 3 March 2016)

    An Overview of Cryptography (Updated Version, 3 March 2016)

  • Avtcore W. Kim Internet-Draft J. Lee Intended Status: Informational J

    Avtcore W. Kim Internet-Draft J. Lee Intended Status: Informational J

Top View
  • Related-Cipher Attacks on Block Ciphers with Flexible Number Of
  • Cryptanalysis of AES-Based Hash Functions
  • Integral Cryptanalysis of SPN Ciphers with Binary Permutations
  • Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
  • My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
  • Avtcore W. Kim Internet-Draft J. Lee Intended Status: Standards Track D
  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
  • Authenticated Encryption Requirements
  • Automatic Search of Truncated Impossible Differentials for Word
  • Improved Integral Attacks on Reduced Round Camellia
  • A Review on Combined Attacks on Security Systems
  • Improved Linear Cryptanalysis of Round-Reduced ARIA
  • University of Southampton Research Repository Eprints Soton
  • Internet Engineering Task Force (IETF) W. Kim Request for Comments: 6209 J
  • Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-Sum and FFT
  • New Impossible Differential Search Tool from Design and Cryptanalysis
  • Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things
  • New Block Cipher: ARIA


© 2024 Docslib.org    Feedback