DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Cryptanalysis
Cryptanalysis
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Key-Dependent Approximations in Cryptanalysis. an Application of Multiple Z4 and Non-Linear Approximations
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
Impossible Differential Cryptanalysis of TEA, XTEA and HIGHT
Polish Mathematicians Finding Patterns in Enigma Messages
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK
Applying Differential Cryptanalysis for XTEA Using a Genetic Algorithm
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
Cryptology, Cryptography, Cryptanalysis. Definitions, Meanings, Requirements, and Current Challenges
Data Encryption Standard (DES)
Cryptanalysis of the ``Kindle'' Cipher
History and Modern Cryptanalysis of Enigma's Pluggable Reflector
1. History of Cryptography Cryptography (From Greek , Hidden
Differential Cryptanalysis of the Data Encryption Standard
Algebraic Cryptanalysis of the Data Encryption Standard
Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau
Top View
A Brief History of Cryptography
Differential Cryptanalysis
Differential Cryptanalysis of the Data Encryption Standard Eli Biham Adi Shamir
New Directions in Cryptanalysis of Block Ciphers
Enigma Cipher Machine Simulator 7.0.5
Cryptanalysis of S-DES
Part I History and Machines of Cryptography
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
Cryptanalysis of FIDES
German Cipher Machines of World War II This Publication Is a Product of the National Security Agency History Program
Statistical Cryptanalysis of Block Ciphers
Analysis of RC2
Chapter 5: Propagation and Correlation
A Secure and Efficient Lightweight Symmetric Encryption Scheme For
History of Cryptography in Syllabus on Information Security Training Sergey Zapechnikov, Alexander Tolstoy, Sergey Nagibin
CRYPTOGRAPHY and NETWORK SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology
On the Design and Security of RC2
Cryptanalytic Attacks on DES Block Cipher
Introduction to Cryptography
Facts and Myths of Enigma: Breaking Stereotypes
Cryptanalysis: Correlation Attacks on LFSR-Based Stream Ciphers
Cryptography: History and Simple Encryption Methods and Preliminaries
A Deeper Look at Machine Learning-Based Cryptanalysis
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
The Cryptanalysis of the Enigma Cipher
Cryptanalysis of the Tiny Encryption Algorithm
Fast Correlation Attacks: Methods and Countermeasures
Data Encryption Standard
Bit-Wise Cryptanalysis on AND-RX Permutation Friet-PC
Introduction to Cryptanalysis: Attacking Stream Ciphers
Neural Cryptanalysis, Evaluation, —Black-Box .I I
A Self-Study Course in Block-Cipher Cryptanalysis
New Results on the Genetic Cryptanalysis of TEA and Reduced-Round Versions of XTEA
Project 3: Correlation Attack
A Crypt Analysis of the Tiny Encryption Algorithm in Key Generation
A Tutorial on Linear and Differential Cryptanalysis
A Survey on the Cryptanalysis of the Advanced Encryption Standard
An Overview of Cryptanalysis Research for the Advanced
4-7 Security Evaluation of Cryptographic Technology
Lecture 4 Data Encryption Standard (DES)
The First Experimental Cryptanalysis of the Data Encryption Standard
The Cryptanalysis of the Enigma Cipher. the Plugboard and the Cryptologic Bomb
Improved Integral Attacks on Reduced Round Camellia
Nessie Proposal: NOEKEON
Practical Cryptanalysis of SFLASH
Re-Engineering the Enigma Cipher
AN OVERVIEW of CRYPTANALYSIS on AES Km
A Brief History of Cryptography Including Related Terms
Implications of Bitsum Attack on Tiny Encryption Algorithm and Xtea
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
Cryptanalysis of Selected Block Ciphers
Overview of Modern Symmetric-‐Key Cipher Cryptanalysis Techniques
Cryptanalysis of Block Ciphers: a Survey
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Past, Present, and Future Methods of Cryptography and Data Encryption
A Modified XTEA
A Tutorial on Linear and Differential Cryptanalysis
Block Cipher Cryptanalysis: an Overview
Chosen-Plaintext Attack Ciphertext-Only Attack Known-Plaintext Attack