DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» ARIA (cipher)
ARIA (cipher)
Authentication Key Recovery on Galois/Counter Mode (GCM)
Impossible Differential Cryptanalysis of Reduced Round Hight
Security Enhancement in Cloud Storage Using ARIA and Elgamal Algorithms
ARIA-CTR Encryption for Low-End Embedded Processors
Cryptanalysis of Selected Block Ciphers
Encryption Block Cipher
Cryptanalysis of Block Ciphers
S-Box Construction Based on Linear Fractional Transformation and Permutation Function
Multidimensional Differential-Linear Cryptanalysis of ARIA Block Cipher
Analysis of Linear Relationships in Block Ciphers
Design and Implementation of Unified Hardware for 128-Bit Block Ciphers ARIA and AES
Attacking Reduced Rounds of the ARIA Block Cipher
ARIA/AES 기반 GCM 인증암호를 지원하는 암호 프로세서 a Cryptographic Processor Supporting ARIA/AES-Based GCM Authenticated Encryption
Impossible Differential Cryptanalysis of ARIA and Camellia
Implementation of ARIA Cryptographic Modules Based on ARM9 Devices
Cryptanalysis and Design of Symmetric Primitives
An Overview of Cryptography (Updated Version, 3 March 2016)
Avtcore W. Kim Internet-Draft J. Lee Intended Status: Informational J
Top View
Related-Cipher Attacks on Block Ciphers with Flexible Number Of
Cryptanalysis of AES-Based Hash Functions
Integral Cryptanalysis of SPN Ciphers with Binary Permutations
Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and finite field Multiplication
My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
Avtcore W. Kim Internet-Draft J. Lee Intended Status: Standards Track D
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
Authenticated Encryption Requirements
Automatic Search of Truncated Impossible Differentials for Word
Improved Integral Attacks on Reduced Round Camellia
A Review on Combined Attacks on Security Systems
Improved Linear Cryptanalysis of Round-Reduced ARIA
University of Southampton Research Repository Eprints Soton
Internet Engineering Task Force (IETF) W. Kim Request for Comments: 6209 J
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-Sum and FFT
New Impossible Differential Search Tool from Design and Cryptanalysis
Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things
New Block Cipher: ARIA
Stream Ciphers
FIPS 140-2 Non-Proprietary Security Policy
Cryptography and Computer Security
Hunton Andrews Kurth and Aria Development Group Announce Partnership with Project Destined for Virtual Internship Program
2021 Candidates for U.S. Presidential Scholars Program
Secure Block Ciphers - Cryptanalysis and Design
Seeking a Better View: Using 3D to Investigate Visibility in Historic Landscapes