DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Key whitening
Key whitening
Block Ciphers
Performance Evaluation of Newly Proposed Lightweight Cipher, BRIGHT
Network Security H B ACHARYA
Applied Cryptography and Data Security
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
Journal Paper Format
Vulnerability Analysis of PRINCE and RECTANGLE Using DPA
A Survey of ARX-Based Symmetric-Key Primitives
A Small and Fast Lightweight Block Cipher for 32-Bit Processor
CLEFIA Implementation with Full Key Expansion
Understanding Cryptography” by Christof Paar and Jan Pelzl Springer, 2010
Bright - Proposed Family of Lightweight Block Ciphers for Iot-Enabled Smart Environment
Lecture Notes in Computer Science 2365 Edited by G
New Lightweight DES Variants
New Light-Weight Crypto Algorithms for RFID
Modes of Operation
White-Box Cryptography: Hiding Keys in Software
Secret-Key Cryptography from Ideal Primitives: a Systematic Overview
Top View
ASIC Performance Comparison for the ISO Standard Block Ciphers
Security Amplification Against Meet-In-The-Middle Attacks Using
Attacks & Analysis of Openssl AES Crypto Material From
Improving Block Cipher Design by Rearranging Internal Operations
Minimalism in Cryptography: the Even-Mansour Scheme Revisited
Plain Versus Randomized Cascading-Based Key-Length Extension for Block Ciphers
Cryptography on a Customized Network Mathematics And
Randomized Clinical Trials of Dental Bleaching – Compliance with the CONSORT Statement: a Systematic Review
COMET Specification
International Journal of Engineering Technology Research & Management
Understanding Cryptography by Christof Paar .Pdf
Generalized in a Straightforward Way to Include More Than One Round
Understanding Cryptography–A Textbook for Students And
Analysis of ARX Functions: Pseudo-Linear Methods for Approximation, Differentials, and Evaluating Diffusion
Lightweight Implementation of the Lowmc Block Cipher Protected Against Side-Channel Attacks
Block Ciphers I
On the Importance of Considering Physical Attacks When
A Comprehensive Comparison of Symmetric Cryptographic Algorithms by Using Multiple Types of Parameters
Serpent and Smartcards
Block Ciphers II
About Block Ciphers Ver
Analysis and Design of Correlation Testing Methods for Expanded Subkeys
Content of This Part
The 128-Bit Blockcipher CLEFIA Design Rationale
The 128-Bit Blockcipher CLEFIA Security and Performance Evaluations
Symmetric Encryption – an Introduction
Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher
High Throughput Area Efficient Architecture for Light Weight
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future Directions
Ovely Rofessional Niversity L
Administrative Details