DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Bart Preneel

Bart Preneel

  • Download

    Download

  • Statistical Weaknesses in 20 RC4-Like Algorithms and (Probably) the Simplest Algorithm Free from These Weaknesses - VMPC-R

    Statistical Weaknesses in 20 RC4-Like Algorithms and (Probably) the Simplest Algorithm Free from These Weaknesses - VMPC-R

  • Security Evaluation of the K2 Stream Cipher

    Security Evaluation of the K2 Stream Cipher

  • Distinguishing Attacks on the Stream Cipher Py

    Distinguishing Attacks on the Stream Cipher Py

  • New Developments in Cryptology Outline Outline Block Ciphers AES

    New Developments in Cryptology Outline Outline Block Ciphers AES

  • Automated Techniques for Hash Function and Block Cipher Cryptanalysis

    Automated Techniques for Hash Function and Block Cipher Cryptanalysis

  • Design and Analysis of RC4-Like Stream Ciphers

    Design and Analysis of RC4-Like Stream Ciphers

  • Phd Thesis, Katholieke Universiteit Leuven, FSE 2003, Volume 2887 of Lecture Notes in Computer Science, Pages 274– Mar

    Phd Thesis, Katholieke Universiteit Leuven, FSE 2003, Volume 2887 of Lecture Notes in Computer Science, Pages 274– Mar

  • Blockchain: Hype Or Reality

    Blockchain: Hype Or Reality

  • The Truth on Tpy

    The Truth on Tpy

  • SFINKS: a Synchronous Stream Cipher for Restricted Hardware Environments ?

    SFINKS: a Synchronous Stream Cipher for Restricted Hardware Environments ?

  • Hash-Functions from Block Ciphers

    Hash-Functions from Block Ciphers

  • Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks

    Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks

  • Cryptanalysis of AES-Based Hash Functions

    Cryptanalysis of AES-Based Hash Functions

  • On the (In) Security of Stream Ciphers Based on Arrays and Modular

    On the (In) Security of Stream Ciphers Based on Arrays and Modular

  • The Hash Function Family LAKE

    The Hash Function Family LAKE

  • Dr. Souradyuti Paul March 15, 2019

    Dr. Souradyuti Paul March 15, 2019

  • Saturnin: a Suite of Lightweight Symmetric Algorithms for Post-Quantum Security Version 1.1 (September 27, 2019)

    Saturnin: a Suite of Lightweight Symmetric Algorithms for Post-Quantum Security Version 1.1 (September 27, 2019)

Top View
  • Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
  • Modern Cryptology: an Introduction
  • Bnl09 Preneel Owasp Benelux09
  • Cryptanalysis of HMAC/NMAC-Whirlpool
  • ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
  • Which Estream Ciphers Have Been Broken?
  • State of the Art in Lightweight Symmetric Cryptography
  • Cryptographic Hash Functions: Theory and Practice
  • Distinguishing Attacks on the Stream Cipher Py?
  • 4.2 Cipher Categorisation
  • RC4 Encryption-A Literature Survey
  • Cryptographic Algorithms February 2018 Bart Preneel
  • Lecture Notes in Computer Science 4986 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
  • The Cryptographic Hash Function Crisis and the SHA-3 Competition
  • Open Problems in Hash Function Security
  • Distinguishing Attacks on the Stream Cipher Py?
  • Image Encryption Using Gingerbreadman Map and RC4A Stream Cipher
  • PY (Roo): a Fast and Secure Stream Cipher Using Rolling Arrays


© 2024 Docslib.org    Feedback