DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» DEAL
DEAL
Impossible Differentials in Twofish
Simple Substitution and Caesar Ciphers
On the Decorrelated Fast Cipher (DFC) and Its Theory
Development of the Advanced Encryption Standard
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Full Version)
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
Miss in the Middle Attacks on IDEA and Khufu
Cryptanalysis of Selected Block Ciphers
Cryptanalysis of Reduced Round SKINNY Block Cipher
Cryptography
Excavations at Giza 1988-1991
A Simple Power Analysis Attack on the Twofish Key Schedule
Gender Differences in Venture Capital Funding on ABC's Shark Tank THESIS Presented in Partial Fulfillment of the Requirements
Cryptography
Jump Index in T-Functions for Designing a New Basic Structure of Stream Ciphers Ali Hadipour, Seyed Mahdi Sajadieh and Raheleh Afifi
An Introduction to Cryptography Version Information an Introduction to Cryptography, Version 8.0
Key Schedule Classification of the AES Candidates
Top View
The Advanced Encryption Standard
Intel(R) Advanced Encryption Standard (AES) New Instructions
Introduction and Administration Information About the Course
Block Ciphers
Practical Attacks on the Round-Reduced PRINCE
Comparison of Symmetric Key Algorithms for Iot Devices
Short Non-Malleable Codes Fromrelated-Key Secure Block Ciphers
Software Implementations and Applications of Elliptic Curve Cryptography
NIST's Round 1 Report on The
New Automatic Search Tool for Impossible Differentials and Zero
Cryptanalysis of a Provably Secure CRT-RSA Algorithm
A Three-Dimensional Block Cipher
Fourier Analysis
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Kobe University Repository : Thesis
A Simple Power Analysis Attack on the Twofish Key Schedule
AES Candidate C
Twofish: a 128-Bit Block Cipher
Links Among Impossible Differential, Integral and Zero Correlation Linear
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
Cryptanalysis of Modular Exponentiation Outsourcing Protocols Charles Bouillaguet, Florette Martinez, Damien Vergnaud
Integral Cryptanalysis of Round-Reduced Prince Cipher
Computation of Approximate L-Th Roots Modulo N and Application to Cryptography
Chapter 7 the Advanced Encryption Standard (AES)
Code and Ciphers: Julius Caesar, the Enigma and the Internet
The Mathematics of Secrets: Cryptography from Caesar Ciphers
Lecture Notes on Cryptography, by Bellare and Goldwasser
Rijndael Algorithm (Advanced Encryption Standard) AES
Key-Schedule Cryptanalysis of DEAL
Modification on the Algorithm of RSA Cryptography System
On the Twofish Key Schedule
A Simple Related-Key Attack on the Full SHACAL-1
Stream Ciphers
Cryptanalysis of Block Ciphers: a Survey
Cryptanalysis of RSA Using Algebraic and Lattic
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis∗
How =1=Not to Use a Blockcipher