DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  GOST (block cipher)

GOST (block cipher)

  • Thesis Submitted for the Degree of Doctor of Philosophy

    Thesis Submitted for the Degree of Doctor of Philosophy

  • Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle

    Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle

  • CRYPTANALYSIS of GOST in the MULTIPLE-KEY SCENARIO 1. The

    CRYPTANALYSIS of GOST in the MULTIPLE-KEY SCENARIO 1. The

  • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

    Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Algebraic Cryptanalysis of GOST Encryption Algorithm

    Algebraic Cryptanalysis of GOST Encryption Algorithm

  • GOST R 34.12-2015: Block Cipher

    GOST R 34.12-2015: Block Cipher "Magma"

  • Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear

    Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear

  • Couv Detection-UK.Indd

    Couv Detection-UK.Indd

  • Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T

    Algebraic Complexity Reduction and Cryptanalysis of GOST Nicolas T

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Gene Ontology Mining Tool Gost Master’S Thesis

    Gene Ontology Mining Tool Gost Master’S Thesis

  • Pycryptodome Documentation Release 3.10.4

    Pycryptodome Documentation Release 3.10.4

  • Cryptanalysis of GOST2: Can Updated Key Schedule Solve All of GOST's

    Cryptanalysis of GOST2: Can Updated Key Schedule Solve All of GOST's

  • Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor

    Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor

  • Propagation of Truncated Differentials in GOST

    Propagation of Truncated Differentials in GOST

  • Related-Key Attacks Slide Statistical RK Conclusion

    Related-Key Attacks Slide Statistical RK Conclusion

  • Differential Cryptanalysis of GOST

    Differential Cryptanalysis of GOST

Top View
  • A Single-Key Attack on the Full GOST Block Cipher
  • Modern Cryptanalysis.Pdf
  • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
  • View the Index
  • Cryptanalysis of the GOST Hash Function
  • Block Ciphers
  • A Proposed Hybrid Cryptography Algorithm Based on GOST and Salsa (20)
  • Algorithms, Key Size and Parameters Report – 2014
  • 7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)
  • A New Encryption Standard of Ukraine: the Kalyna Block Cipher (DSTU 7624:2014)
  • Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
  • Enhanced Truncated Differential Cryptanalysis of GOST
  • Arxiv:1705.08151V2 [Math.GR] 17 May 2018 1
  • Differential Cryptanalysis of Reduced Rounds of GOST
  • Developments in Authenticated Encryption
  • A Lightweight-Friendly Modification of GOST Block Cipher
  • My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
  • An Improved Differential Attack on Full GOST - Extended Version, 17 December 2015∗


© 2024 Docslib.org    Feedback