DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» E2 (cipher)
E2 (cipher)
On the Decorrelated Fast Cipher (DFC) and Its Theory
Hemiunu Used Numerically Tagged Surface Ratios to Mark Ceilings Inside the Great Pyramid Hinting at Designed Spaces Still Hidden Within
Report on the AES Candidates
Cryptanalysis of a Reduced Version of the Block Cipher E2
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis ⋆
Recommendation for Block Cipher Modes of Operation Methods
Camellia: a 128-Bit Block Cipher Suitable for Multiple Platforms – Design Andanalysis
Advanced Encryption Standard by Example 1.0 Preface 2.0 Terminology
Mixture Differential Cryptanalysis and Structural Truncated Differential Attacks on Round-Reduced
Enhancing Hierocrypt-3 Performance by Modifying Its S- Box and Modes of Operations
Differential-Linear Cryptanalysis Revisited
Block Ciphers
Note on the Jacobson Radical in Associative Triple Systems of Second Kind
Cryptanalysis of Known and Attempted Attacks on SIDH and SIKE
Different Levels of Estradiol Are Correlated with Sexual Dysfunction in Adult
Statistical Cryptanalysis of Block Ciphers
CS530 Cryptography
Security of Reduced Version of the Block Cipher Camellia Against Truncated and Impossible Differential Cryptanalysis
Top View
Specification of Camellia | a 128-Bit Block Cipher
Marble Specification
Analysis of Camellia
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
Analysis of RC2
Local Search Approximation Algorithms for Clustering Problems
Tessa Dickinson a Landscape and Materials-Based Approach to Royal Mortuary Architecture in Early Third Millennium BC Egypt Volum
Intel(R) Advanced Encryption Standard (AES) New Instructions
Improved Key Recovery Attack on Round-Reduced Hierocrypt-L1 in the Single-Key Setting
The Block Cipher Hierocrypt
Improved Bounds for Large Scale Capacitated Arc Routing Problem
(Shiho MORIAI) To:
[email protected]
Cc:
[email protected]
Subject: an Official Comment for Aesfirstround
Specification on a Block Cipher : Hierocrypt–3
Integral Cryptanalysis of the Block Cipher E2
AN EXACT ALGORITHM for STABLE INSTANCES of the K-MEANS PROBLEM with PENALTIES in FIXED-DIMENSIONAL EUCLIDEAN SPACE
My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
AES Candidate C
E2 - a Candidate Cipher for AES
Specification on a Block Cipher : Hierocrypt–L1
Advanced Encryption Standard (AES) Objectives
DLCT: a New Tool for Differential-Linear Cryptanalysis
Camellia: a 128-Bit Block Cipher Suitable for Multiple Platforms — Design and Analysis —
FIPS 197, Advanced Encryption Standard (AES)
AES Example - Input (128 Bit Key and Message)
Rigorous Analysis of Truncated Differentials for 5-Round
Proceedings of The
Specification on a Block Cipher : Hierocrypt—L1
Invariant Hoppping Attacks on Block Ciphers
Rijndael Algorithm (Advanced Encryption Standard) AES
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers
Security of E2 Against Truncated Differential Cryptanalysis
Partitions in the S-Box of Streebog and Kuznyechik*
The Great Pyramid: Star Fixed When? the Ancients’ Grandest Eclipse Cycle? 1325 Years 2 2003 December DIO 13.1 2003 December DIO 13.1 3
Methods of Symmetric Cryptanalysis
Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher
Cryptanalysis of Homophonic Substitution-Transposition Cipher
Meet-In-The-Middle Attack on Reduced Versions of the Camellia Block Cipher Jiqiang Lu, Yongshuang Wei, Enes Pasalic, Pierre-Alain Fouque
Specification on a Block Cipher : Hierocrypt—3
Stream Ciphers
Cryptography Against Continuous Memory Attacks
New Results on Rewrite-Based Satisfiability Procedures
Energy Efficient Cipher Technique Harshit Bhatia 1, Rahul Johari 2, Kalpana Gupta 3
Maximum Likelihood Estimation for Block Cipher Keys
Improved Attacks on Reduced-Round Camellia-128/192/256