DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Anubis (cipher)
Anubis (cipher)
The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen
MERGING+ANUBIS User Manual
Optimization of AES Encryption Algorithm with S- Box
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
Cryptanalysis of Feistel Networks with Secret Round Functions ⋆
Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear
Cryptanalysis of Ciphers and Protocols Elad Pinhas Barkan
Cerberus.Pdf
Statistical Cryptanalysis of Block Ciphers
Hardware Performance Characterization of Block Cipher Structures∗
Constructions of Involutions Over Finite Fields
Pharaoh's Scribe
GNU Anubis an SMTP Message Submission Daemon
Statistical Cryptanalysis of Block Ciphers
Ct-Fuzz: Fuzzing for Timing Leaks
Beecrypt Ciphers: Speed by Data Length P3-1000-Debian-Etch Beecrypt Ciphers: Speed by Data Length Ath-2000-Debian-Etch Beecrypt Ciphers: Speed by Data Length 5 16 30
Related-Cipher Attacks on Block Ciphers with Flexible Number Of
Security Arguments and Tool-Based Design of Block Ciphers
Top View
A Three-Dimensional Block Cipher
Minimalism in Cryptography: the Even-Mansour Scheme Revisited
Constantine: Automatic Side-Channel Resistance Using Efficient Control
PRINCE – a Low-Latency Block Cipher for Pervasive Computing Applications Full Version
I'm Sending You on NESSIE Discussion Forum Our Paper About
Cryptanalysis and Design of Lightweight Symmetric‑Key Cryptography
Generalized in a Straightforward Way to Include More Than One Round
The Design of Rijndael
Improbable Differential Cryptanalysis
Silylation of Deoxynucleotide Analog Yields an Orally Available Drug with Anti-Leukemia Effects
Anubis, Seth, and Christ. the Significance of the " Spott-Crucifix
Eliminating Timing Side-Channel Leaks Using Program Repair
Constructing Recursive MDS Matrices Effective for Implementation from Reed-Solomon Codes and Preserving the Recursive Property of MDS Matrix of Scalar Multiplication
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
Classification of Cryptographic Libraries
A Collection of Curricula for the STARLAB Ancient Egyptian Cylinder
Design and Analysis of Symmetric Primitives
Case Studies of Performance Evaluation of Cryptographic Algorithms for an Embedded System and a General Purpose Computer
New Block Cipher: ARIA
Safe and Automated Live Malware Experimentation on Public Testbeds∗
The Pit Bull Placebo
Software Performance Characterization of Block Cipher Structures Using S-Boxes and Linear Mappings∗
Advanced Encryption Standard - Wikipedia
Meet-In-The-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
Secure and Fast Implementations of Two Involution Ciphers
An Involutive Lightweight Block Cipher