BEAR and LION ciphers
Top View
- Cryptanalytic Study of Property-Preserving Encryption
- Stronger Password-Based Encryption Using All-Or-Nothing Transforms
- On the Provable Security of BEAR and LION Schemes
- Unbalanced Feistel Networks and Block Cipher Design
- Analysis of Block Cipher Constructions Against Biclique and Multiset Attacks
- Hardware Design for Hash Functions
- All-Or-Nothing Encryption and the Package Transform
- Cryptanalysis of Selected Block Ciphers