DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» CRYPTREC
CRYPTREC
Security Evaluation of Stream Cipher Enocoro-128V2
Analysis of Selected Block Cipher Modes for Authenticated Encryption
Fair and Efficient Hardware Benchmarking of Candidates In
Security Evaluation of the K2 Stream Cipher
Modes of Operation for Compressed Sensing Based Encryption
(DICOM) Supplement 206 – CRYPTREC TLS
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Authentication Key Recovery on Galois/Counter Mode (GCM)
Year 2010 Issues on Cryptographic Algorithms
CRYPTREC Report 2001
A New Modified RC6 Algorithm for Cryptographic Applications
Enhancing Hierocrypt-3 Performance by Modifying Its S- Box and Modes of Operations
Golden Fish an Intelligent Stream Cipher Fuse Memory Modules
Meet-In-The-Middle Attacks on Reduced-Round Hierocrypt-3
How to Evaluate the Security of Real-Life Cryptographic Protocols? the Cases of ISO/IEC 29128 and CRYPTREC
Introduction to Provable Security
4312 NTT Software Corporation Category: Standards Track S. Moriai Sony Computer Entertainment Inc
CRYPTREC Project 2001
Top View
Improved Square Attacks Against Reduced-Round Hierocrypt
A Comparative Survey on Symmetric Key Encryption Algorithms
Japan CRYPTREC Activity on Lightweight Cryptography
Analysis of RC2
Anything-But Eazy in Hardware
A Formally Verified Proposal for the Use of Authenticated Wrapping in PKCS
View the Index
Cryptographic Technology Guideline (Lightweight Cryptography)
Applications and Standardization of Lightweight Cryptography
Report on Lightweight Cryptography
Activities on PQC in Japan
Increase Throughput of CCM Security Mode Using MKP
Symmetric Algorithm Survey: a Comparative Analysis
International Journal of Engineering Technology Research & Management
Cryptographic Specifications CIPHERUNICORN-E
CRYPTREC Activities and a Revision of the E-Government Recommended Ciphers List
Performance Evaluation of Cryptographic Ciphers on Iot Devices
4-7 Security Evaluation of Cryptographic Technology
Specification on a Block Cipher : Hierocrypt—L1
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Analyzing the Performance of the Advanced
State of the Art in Lightweight Symmetric Cryptography
CRYPTREC Report 2000 (Provisional Translation)
UNIT-I Q.1 Explain Differential and Linear Cryptanalysis of DES
Methods and Tools for Analysis of Symmetric Cryptographic Primitives
Evaluation of Some Blockcipher Modes of Operation
Transformation and Security Analysis of NLFSR-Based Stream Ciphers
Digital Imaging and Communications in Medicine (DICOM)
Breaking and Repairing GCM Security Proofs
Choosing Algorithms to Standardise
Algebraic Attacks on Stream Ciphers with Linear Feedback
Post-Quantum Cryptography and Japan CRYPTREC
Specification on a Block Cipher : Hierocrypt—3
Algebraic Attacks on Stream Ciphers with Linear Feedback
Symmetric-Key Cryptographic Technique Evaluation Policy
Internet Infrastructure Review Vol.49
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Malaysian Validation Programs Overview
Study of Block Ciphers- Counter Mode and Output Feedback Mode
Botan Reference Guide Release 2.18.1
Advanced Encryption Standard - Wikipedia
Hash Functions: Part 2 Macs & Authenticated Ciphers Required Reading
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
A Comparison of Lightweight Ciphers Meeting Nist