DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Hasty Pudding cipher

Hasty Pudding cipher

  • Report on the AES Candidates

    Report on the AES Candidates

  • The Long Road to the Advanced Encryption Standard

    The Long Road to the Advanced Encryption Standard

  • Elastic Block Ciphers: the Basic Design

    Elastic Block Ciphers: the Basic Design

  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

    Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1

  • Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear

    Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear

  • Encryption Block Cipher

    Encryption Block Cipher

  • SKINNY-AEAD and SKINNY-Hash Specification

    SKINNY-AEAD and SKINNY-Hash Specification

  • AES); Cryptography; Cryptanaly- the Candidates

    AES); Cryptography; Cryptanaly- the Candidates

  • Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

  • Performance Comparison of the AES Submissions

    Performance Comparison of the AES Submissions

  • Adiantum: Length-Preserving Encryption for Entry-Level Processors

    Adiantum: Length-Preserving Encryption for Entry-Level Processors

  • Tweakable Block Ciphers

    Tweakable Block Ciphers

  • View the Index

    View the Index

  • Tweakable Block Ciphers

    Tweakable Block Ciphers

  • Elastic Block Ciphers: Method, Security and Instantiations

    Elastic Block Ciphers: Method, Security and Instantiations

  • Tweaks and Keys for Block Ciphers: the TWEAKEY Framework

    Tweaks and Keys for Block Ciphers: the TWEAKEY Framework

  • Tweaking Even-Mansour Ciphers

    Tweaking Even-Mansour Ciphers

  • Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

    Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

Top View
  • Linear Cryptanalysis of Non Binary Ciphers (With an Application to SAFER)
  • Designing Cryptography for the New Century
  • SKINNY-AEAD and SKINNY-Hash
  • AES Candidate C
  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
  • Format-Preserving Encryption
  • Cryptanalysis of Feistel-Based Format-Preserving Encryption
  • First Advanced Encryption Standard (AES) DES
  • On the Internal Structure of the Advanced Encryption Standard and Two AES-Based Cryptographic Constructions Jianyong Huang University of Wollongong
  • Impossible-Differential and Boomerang Cryptanalysis of Round
  • Key-Schedule Cryptanalysis of DEAL
  • AES Public Comment from the Rijndael Team
  • Evaluation of Some Blockcipher Modes of Operation
  • The SKINNY Family of Lightweight Tweakable Block Ciphers
  • Methods for Format-Preserving Encryption
  • The SKINNY Family of Lightweight Tweakable Block Ciphers
  • Elastic Block Ciphers
  • Stream Ciphers


© 2024 Docslib.org    Feedback