- Home
- » Tags
- » Block cipher
Top View
- Block Ciphers and Modes of Operation
- Cryptanalysis of Reduced Round SKINNY Block Cipher
- AES-CCM Brief
- Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation
- Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
- Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
- Simplified Idea Algorithm
- Lecture 4 1 Pseudorandom Functions & Block Ciphers
- Statistical Cryptanalysis of Block Ciphers
- The Avalanche Effect of Various Hash Functions Between Encrypted Raw Images Versus Non-Encrypted Images: a Comparison Study
- Chapter 5: Propagation and Correlation
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- A Pros and Cons of Block Cipher Modes for Symmetric Key Algorithms
- Attacks on Stream Ciphers: a Perspective
- Cache Timing Attacks on Camellia Block Cipher∗
- The SIV Mode of Operation for Deterministic Authenticated-Encryption (Key Wrap) and Misuse-Resistant Nonce-Based Authenticated-Encryption
- Block Ciphers Data Encryption Standard
- Block Cipher Operation
- Block Ciphers
- Tweakable Block Ciphers
- TWINE: a Lightweight, Versatile Block Cipher
- A New Method for Designing Lightweight S-Boxes with High Differential and Linear Branch Numbers, and Its Application?
- An Innovative Design of Substitution-Boxes Using Cubic Polynomial Mapping
- AES Encryption White Paper
- Encryption Modes & Other Block Ciphers
- Advanced Encryption Standard Block Ciphers: Take Input in fixed Size Blocks; Implemented in Rounds: Perform Similar Operations Repeatedly to a “State”;
- My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
- A Survey on Various Dynamic S-Box Implementation in Block Cipher Encryption Algorithm
- Data Encryption Standard
- Triple SV a Bit Level Symmetric Block Cipher Having High Avalanche Effect
- Chapter 3: Block Ciphers and the Data Encryption Standard
- Modes of Operation Block Ciphers
- PRINCE – a Low-Latency Block Cipher for Pervasive Computing Applications Full Version
- International Journal of Engineering Technology Research & Management
- DLCT: a New Tool for Differential-Linear Cryptanalysis
- Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
- Correlation Differential Power Analysis Attack to Midori64
- Submission to NIST: Counter with CBC-MAC (CCM) AES Mode Of
- Revisiting AES-GCM-SIV: Multi-User Security, Faster Key Derivation, and Better Bounds
- The LED Block Cipher∗
- Lecture 4 Data Encryption Standard (DES)
- Proposed Model of Encryption Technique Using Block Cipher Concept to Enhance Avalanche Effect
- Evaluation of Blowfish Algorithm Based on Avalanche Effect
- Authenticated Encryption Modes of Block Ciphers, Their Security and Implementation Properties
- Nessie Proposal: NOEKEON
- Chapter 7 the Advanced Encryption Standard (AES)
- Pseudorandom Functions & Block Ciphers
- Chapter 7 Advanced Encryption Standard (AES)
- On the Security of the CCM Encryption Mode and of a Slight Variant
- Rijndael Algorithm (Advanced Encryption Standard) AES
- GCM-SIV Encrypt GCM-SIV AES-GCM Decrypt GCM-SIV
- Multidimensional Zero-Correlation Attacks on Lightweight Block Cipher HIGHT: Improved Cryptanalysis of an ISO Standard
- Iapm, Xcbc, Ocb, Ccm, Eax, Cwc, Gcm, Pcfb, Cs)
- A Novel Approach to Improve Avalanche Effect of AES Algorithm
- Block Ciphers and Data Encryption Standard
- AES-GCM-SIV: Specification and Analysis
- Chapter 4 Block Ciphers
- New Block Cipher: ARIA
- Few Other Cryptanalytic Techniques Objectives
- The Boomerang Attack
- Strict Key Avalanche Criterion
- Block Cipher Modes of Operation
- Stream and Block Encryption
- Decorrelation Theory Aslı Bay I&C, EPFL
- Avalanche Effect: a Judgement Parameter of Strength in Symmetric Key Block Ciphers
- On the Security of CTR + CBC-MAC
- Block Ciphers What Is a Block Cipher?
- Block Ciphers
- Block Cipher Encrypting a Large Message Electronic Code Book (ECB)
- Lecture 8: AES: the Advanced Encryption Standard