DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Block cipher

Block cipher

  • Block Ciphers and the Data Encryption Standard

    Block Ciphers and the Data Encryption Standard

  • KLEIN: a New Family of Lightweight Block Ciphers

    KLEIN: a New Family of Lightweight Block Ciphers

  • Chapter 3 – Block Ciphers and the Data Encryption Standard

    Chapter 3 – Block Ciphers and the Data Encryption Standard

  • A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations 1Balajee Maram and 2J.M

    A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations 1Balajee Maram and 2J.M

  • A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications

    A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications

  • Construction of Stream Ciphers from Block Ciphers and Their Security

    Construction of Stream Ciphers from Block Ciphers and Their Security

  • Chapter 2 Block Ciphers

    Chapter 2 Block Ciphers

  • Recommendation for Block Cipher Modes of Operation Methods

    Recommendation for Block Cipher Modes of Operation Methods

  • Fast Correlation Attacks: Methods and Countermeasures

    Fast Correlation Attacks: Methods and Countermeasures

  • Block Ciphers

    Block Ciphers

  • Block Cipher and Data Encryption Standard (DES)

    Block Cipher and Data Encryption Standard (DES)

  • A Novel Construction of Efficient Substitution-Boxes Using Cubic

    A Novel Construction of Efficient Substitution-Boxes Using Cubic

  • Advanced Encryption Standard History Of

    Advanced Encryption Standard History Of

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES)

  • Reconsidering the Security Bound of AES-GCM-SIV

    Reconsidering the Security Bound of AES-GCM-SIV

  • Fast Correlation Attacks on Certain Stream Ciphers

    Fast Correlation Attacks on Certain Stream Ciphers

  • Optimizing Authenticated Encryption Algorithms

    Optimizing Authenticated Encryption Algorithms

  • Galois-Counter Mode-Synthetic Initialization Vector

    Galois-Counter Mode-Synthetic Initialization Vector

Top View
  • Block Ciphers and Modes of Operation
  • Cryptanalysis of Reduced Round SKINNY Block Cipher
  • AES-CCM Brief
  • Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation
  • Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
  • Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
  • Simplified Idea Algorithm
  • Lecture 4 1 Pseudorandom Functions & Block Ciphers
  • Statistical Cryptanalysis of Block Ciphers
  • The Avalanche Effect of Various Hash Functions Between Encrypted Raw Images Versus Non-Encrypted Images: a Comparison Study
  • Chapter 5: Propagation and Correlation
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • A Pros and Cons of Block Cipher Modes for Symmetric Key Algorithms
  • Attacks on Stream Ciphers: a Perspective
  • Cache Timing Attacks on Camellia Block Cipher∗
  • The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
  • Block Ciphers Data Encryption Standard
  • Block Cipher Operation


© 2024 Docslib.org    Feedback