DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» BEAR and LION ciphers
BEAR and LION ciphers
Two Practical and Provably Secure Block Ciphers: BEAR and LION
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
All-Or-Nothing Encryption and the Package Transform
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
Taxophrase: Exploring Knowledge Base Via Joint Learning of Taxonomy and Topical Phrases
Statistical Cryptanalysis of Block Ciphers
Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
SECURE ALGORITHMS Minding Your MAC Algorithms?
Statistical Cryptanalysis of Block Ciphers
Block Ciphers
7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)
Py (Roo): a Fast and Secure Stream Cipher
My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
Analysis and Design of Block Ciphers
Twofish: a 128-Bit Block Cipher
A Study of Luby-Rackoff Ciphers Zulfikar Amin Ramzan
LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World
Top View
Cryptanalytic Study of Property-Preserving Encryption
Stronger Password-Based Encryption Using All-Or-Nothing Transforms
On the Provable Security of BEAR and LION Schemes
Unbalanced Feistel Networks and Block Cipher Design
Analysis of Block Cipher Constructions Against Biclique and Multiset Attacks
Hardware Design for Hash Functions
All-Or-Nothing Encryption and the Package Transform
Cryptanalysis of Selected Block Ciphers