DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Interpolation attack
Interpolation attack
Report on the AES Candidates
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
ICEBERG : an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
A Brief Outlook at Block Ciphers
Decorrelation: a Theory for Block Cipher Security
SEA a Scalable Encryption Algorithm for Small Embedded Applications
Statistical Cryptanalysis of Block Ciphers
Recent Developments in the Design of Conventional Cryptographic Algorithms
New Directions in Cryptanalysis of Block Ciphers
On the Interpolation Attacks on Block Ciphers 111
CRYPTREC Report 2008 暗号技術監視委員会報告書
Lecture Notes in Computer Science 2365 Edited by G
Statistical Cryptanalysis of Block Ciphers
Analysis of RC2
Impossible Differential Cryptanalysis of ARIA and Camellia
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full Mimc (Full Version)
Modern Cryptanalysis.Pdf
A Library of C++ Classes for Vector Boolean Functions in Cryptography
Top View
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
Symmetric Encryption Based on Toffoli-Gates Over Large Finite Fields
Cryptanalytic Attacks on DES Block Cipher
Cryptrec Ex-2004-2010
Towards a Unifying View of Block Cipher Cryptanalysis
Security Arguments and Tool-Based Design of Block Ciphers
A Three-Dimensional Block Cipher
Intelligent Systems for Information Security
A Self-Study Course in Block-Cipher Cryptanalysis
Twofish: a 128-Bit Block Cipher
E2 - a Candidate Cipher for AES
A Survey on the Cryptanalysis of the Advanced Encryption Standard
Optimized Interpolation Attacks on Lowmc
An Overview of Cryptanalysis Research for the Advanced
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
New Impossible Differential Cryptanalysis of ARIA
AN OVERVIEW of CRYPTANALYSIS on AES Km
MOE: Multiplication Operated Encryption with Trojan Resilience
Mimc: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
PDF, 201 Kbytes
The Enchilada Authenticated Ciphers, V1
Few Other Cryptanalytic Techniques Objectives
Security in Mobile Agent Systems: an Approach to Protect Mobile
Cryptanalysis of Block Ciphers: a Survey
Copyrighted Material