DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Cryptanalysis

Cryptanalysis

  • Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

    Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher

  • Key-Dependent Approximations in Cryptanalysis. an Application of Multiple Z4 and Non-Linear Approximations

    Key-Dependent Approximations in Cryptanalysis. an Application of Multiple Z4 and Non-Linear Approximations

  • Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA

    Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA

  • Impossible Differential Cryptanalysis of TEA, XTEA and HIGHT

    Impossible Differential Cryptanalysis of TEA, XTEA and HIGHT

  • Polish Mathematicians Finding Patterns in Enigma Messages

    Polish Mathematicians Finding Patterns in Enigma Messages

  • Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK

    Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK

  • Applying Differential Cryptanalysis for XTEA Using a Genetic Algorithm

    Applying Differential Cryptanalysis for XTEA Using a Genetic Algorithm

  • Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT

    Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT

  • Cryptology, Cryptography, Cryptanalysis. Definitions, Meanings, Requirements, and Current Challenges

    Cryptology, Cryptography, Cryptanalysis. Definitions, Meanings, Requirements, and Current Challenges

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES)

  • Cryptanalysis of the ``Kindle'' Cipher

    Cryptanalysis of the ``Kindle'' Cipher

  • History and Modern Cryptanalysis of Enigma's Pluggable Reflector

    History and Modern Cryptanalysis of Enigma's Pluggable Reflector

  • 1. History of Cryptography Cryptography (From Greek , Hidden

    1. History of Cryptography Cryptography (From Greek , Hidden

  • Differential Cryptanalysis of the Data Encryption Standard

    Differential Cryptanalysis of the Data Encryption Standard

  • Algebraic Cryptanalysis of the Data Encryption Standard

    Algebraic Cryptanalysis of the Data Encryption Standard

  • Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

    Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

Top View
  • A Brief History of Cryptography
  • Differential Cryptanalysis
  • Differential Cryptanalysis of the Data Encryption Standard Eli Biham Adi Shamir
  • New Directions in Cryptanalysis of Block Ciphers
  • Enigma Cipher Machine Simulator 7.0.5
  • Cryptanalysis of S-DES
  • Part I History and Machines of Cryptography
  • Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
  • Cryptanalysis of FIDES
  • German Cipher Machines of World War II This Publication Is a Product of the National Security Agency History Program
  • Statistical Cryptanalysis of Block Ciphers
  • Analysis of RC2
  • Chapter 5: Propagation and Correlation
  • A Secure and Efficient Lightweight Symmetric Encryption Scheme For
  • History of Cryptography in Syllabus on Information Security Training Sergey Zapechnikov, Alexander Tolstoy, Sergey Nagibin
  • CRYPTOGRAPHY and NETWORK SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology
  • On the Design and Security of RC2
  • Cryptanalytic Attacks on DES Block Cipher


© 2024 Docslib.org    Feedback