- Home
- » Tags
- » Key schedule
Top View
- Simplified Idea Algorithm
- KASUMI Specification
- An Overview of Cryptography (Updated Version, 3 March 2016)
- Key Schedule Classification of the AES Candidates
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Software Protection Against Fault and Side Channel Attacks
- 3GPP KASUMI Evaluation Report
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Block Ciphers
- An Improved Power Analysis Attack Against Camellia's Key Schedule
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks Benoît Cogliati, Y
- A New Symmetric Cryptosystem Based on Kronecker's
- 7.4.2 DES Algorithm DES Is a Feistel Cipher Which Processes Plaintext Blocks of N =64Bits, Producing 64-Bit Ciphertext Blocks (Figure 7.8)
- Impossible Differential Cryptanalysis of Reduced Round Hight
- A Single-Key Attack on 6-Round KASUMI
- Specification on a Block Cipher : Hierocrypt–3
- Key Schedule Weaknesses in SAFER+
- Vectorial Boolean Functions for Cryptography
- Cryptanalysis of Magenta
- Multi-Key Security: the Even-Mansour Construction Revisited Nicky Mouha, Atul Luykx
- Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI Lawrence P
- My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
- Known-Key Distinguisher on Full PRESENT
- A Block Cipher Using Key-Dependent S-Box and P-Boxes
- Saturnin: a Suite of Lightweight Symmetric Algorithms for Post-Quantum Security Version 1.1 (September 27, 2019)
- AN2837, KASUMI Block Cipher on the Starcore SC140 Core
- Design and Implementation of Idea Algorithm Key Schedule on Fpga
- Cryptography Outline Crypto That Is Not Covered
- A Simple Power Analysis Attack on the Twofish Key Schedule
- AES Candidate C
- I'm Sending You on NESSIE Discussion Forum Our Paper About
- Twofish: a 128-Bit Block Cipher
- Specification on a Block Cipher : Hierocrypt–L1
- Known-Key Distinguishers for Some Block Ciphers*
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- A Better Key Schedule for Des-Like Ciphers
- A HIGH THROUGHPUT FPGA CAMELLIA IMPLEMENTATION Daniel Denning, James Irvine, Malachy Devlin
- Key Classification Attack on Block Ciphers
- Specification on a Block Cipher : Hierocrypt—L1
- Impossible Differential Cryptanalysis of SPN Ciphers
- Key Schedule Algorithms
- Nessie Proposal: NOEKEON
- Arxiv:2009.04274V2 [Cs.CR] 15 Oct 2020
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- Rijndael Algorithm (Advanced Encryption Standard) AES
- Key-Schedule Cryptanalysis of DEAL
- University of Southampton Research Repository Eprints Soton
- Related-Key Impossible Differential Attacks on 8-Round AES-192
- A Novel Methodology for Analysis of the Computational Complexity of Block Ciphers: Rijndael, Camellia and Shacal-2 Compared
- Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT Antonio Florez Gutierrez, María Naya-Plasencia
- Key Scheduling DES Type Cryptosystems
- Analysis and Design of Correlation Testing Methods for Expanded Subkeys
- Cryptographic Strength Evaluation of Key Schedule Algorithms
- On the Twofish Key Schedule
- Review Paper on Cryptosystems Used in Cellular Networks
- Study of Impossible Differential Cryptanalysis on Block Ciphers
- Specification on a Block Cipher : Hierocrypt—3
- Combined Attacks on the AES Key Schedule
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- New Observation on the Key Schedule of RECTANGLE
- Security Analysis of Cryptographic Algorithms
- Lecture 8: AES: the Advanced Encryption Standard
- A Tutorial on Linear and Differential Cryptanalysis
- A Generalised Testbed for Analysing Block and Stream Ciphers
- LOKI - a Cryptographic Primitive for Authentication and Secrecy Applications