DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  BEAR and LION ciphers

BEAR and LION ciphers

  • Two Practical and Provably Secure Block Ciphers: BEAR and LION

    Two Practical and Provably Secure Block Ciphers: BEAR and LION

  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

    Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

  • All-Or-Nothing Encryption and the Package Transform

    All-Or-Nothing Encryption and the Package Transform

  • The Key-Dependent Message Security of Key-Alternating Feistel Ciphers

    The Key-Dependent Message Security of Key-Alternating Feistel Ciphers

  • Building Provably Secure Block Ciphers from Cryptographic Hash Functions

    Building Provably Secure Block Ciphers from Cryptographic Hash Functions

  • Taxophrase: Exploring Knowledge Base Via Joint Learning of Taxonomy and Topical Phrases

    Taxophrase: Exploring Knowledge Base Via Joint Learning of Taxonomy and Topical Phrases

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G

    Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G

  • SECURE ALGORITHMS Minding Your MAC Algorithms?

    SECURE ALGORITHMS Minding Your MAC Algorithms?

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Block Ciphers

    Block Ciphers

  • 7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)

    7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)

  • Py (Roo): a Fast and Secure Stream Cipher

    Py (Roo): a Fast and Secure Stream Cipher

  • My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?

    My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?

  • Analysis and Design of Block Ciphers

    Analysis and Design of Block Ciphers

  • Twofish: a 128-Bit Block Cipher

    Twofish: a 128-Bit Block Cipher

  • A Study of Luby-Rackoff Ciphers Zulfikar Amin Ramzan

    A Study of Luby-Rackoff Ciphers Zulfikar Amin Ramzan

  • LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World

    LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World

Top View
  • Cryptanalytic Study of Property-Preserving Encryption
  • Stronger Password-Based Encryption Using All-Or-Nothing Transforms
  • On the Provable Security of BEAR and LION Schemes
  • Unbalanced Feistel Networks and Block Cipher Design
  • Analysis of Block Cipher Constructions Against Biclique and Multiset Attacks
  • Hardware Design for Hash Functions
  • All-Or-Nothing Encryption and the Package Transform
  • Cryptanalysis of Selected Block Ciphers


© 2024 Docslib.org    Feedback