DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Distinguishing attack
Distinguishing attack
Zero Correlation Linear Cryptanalysis on LEA Family Ciphers
3GPP TR 55.919 V6.1.0 (2002-12) Technical Report
Balanced Permutations Even–Mansour Ciphers
Pseudorandomness of Basic Structures in the Block Cipher KASUMI
Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)
Statistical Cryptanalysis of Block Ciphers
On the Applicability of Distinguishing Attacks Against Stream Ciphers
The Exchange Attack: How to Distinguish Six Rounds of AES with 288.2 Chosen Plaintexts
6 September 2006 Specification of the 3GPP Confidentiality And
Analysis of Camellia
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
Linear Redundancy in S-Boxes
Two Versions of the Stream Cipher Snow a Thesis Submitted to the Graduate School of Natural and Applied Sciences of Middle East
Cryptanalysis of the Full MMB Block Cipher
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
Security Analysis of KNOT-AEAD and KNOT-Hash
Algorithms, Key Size and Parameters Report – 2014
Top View
(In-)Security of 64-Bit Block Ciphers
Comparison of Symmetric Key Algorithms for Iot Devices
Giophantus Distinguishing Attack Is a Low Dimensional Learning with Errors Problem
Known-Key Distinguisher on Full PRESENT
Cryptanalysis of the Counter Mode of Operation Ferdinand Sibleyras
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
An Overview of Cryptanalysis Research for the Advanced
Nonlinear Invariant Attack
Symmetric Cryptography
Building Secure Block Ciphers on Generic Attacks Assumptions
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Distinguishing Attack on the ABC V.1 and V .2
AN OVERVIEW of CRYPTANALYSIS on AES Km
Some Results on Distinguishing Attacks on Stream Ciphers Englund
Review of a New Distinguishing Attack Using Block Cipher with a Neural Network
On Design of Robust Lightweight Stream Cipher with Short Internal State
Distinguishing Attack on Grain
Analysis of Boomerang Di Erential Trails Via a SAT-Based Constraint
Cryptanalysis of Selected Block Ciphers
Distinguishing Attack on Common Scrambling Algorithm
On the Multi-Output Filtering Model and Its Applications
Integral Cryptanalysis on Reduced-Round Tweakable TWINE
Cryptanalysis of Selected Stream Ciphers Stankovski, Paul
The Distinguishing Attack on Speck, Simon, Simeck, HIGHT and LEA
On Algebraic and Statistical Properties of AES-Like Ciphers
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST *
Symmetric Encryption Algorithm for RFID Systems Using a Dynamic Generation of Key