Block cipher
Top View
- Block Ciphers and Modes of Operation
- Cryptanalysis of Reduced Round SKINNY Block Cipher
- AES-CCM Brief
- Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation
- Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
- Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
- Simplified Idea Algorithm
- Lecture 4 1 Pseudorandom Functions & Block Ciphers
- Statistical Cryptanalysis of Block Ciphers
- The Avalanche Effect of Various Hash Functions Between Encrypted Raw Images Versus Non-Encrypted Images: a Comparison Study
- Chapter 5: Propagation and Correlation
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- A Pros and Cons of Block Cipher Modes for Symmetric Key Algorithms
- Attacks on Stream Ciphers: a Perspective
- Cache Timing Attacks on Camellia Block Cipher∗
- The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
- Block Ciphers Data Encryption Standard
- Block Cipher Operation