DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Linear cryptanalysis

Linear cryptanalysis

  • Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

    Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

  • Differential-Linear Crypt Analysis

    Differential-Linear Crypt Analysis

  • Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT

    Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT

  • Linear Cryptanalysis of DES with Asymmetries

    Linear Cryptanalysis of DES with Asymmetries

  • Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-Round Simon

    Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-Round Simon

  • How Far Can We Go Beyond Linear Cryptanalysis?

    How Far Can We Go Beyond Linear Cryptanalysis?

  • Zero Correlation Linear Cryptanalysis with Reduced Data Complexity

    Zero Correlation Linear Cryptanalysis with Reduced Data Complexity

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES)

  • 24 Apr 2014 a Previous Block Cipher Known As MISTY1[10], Which Was Chosen As the Foundation for the 3GPP Confidentiality and Integrity Algorithm[14]

    24 Apr 2014 a Previous Block Cipher Known As MISTY1[10], Which Was Chosen As the Foundation for the 3GPP Confidentiality and Integrity Algorithm[14]

  • AES3 Presentation

    AES3 Presentation

  • Differential-Linear Cryptanalysis Revisited

    Differential-Linear Cryptanalysis Revisited

  • S-Box Construction Based on Linear Fractional Transformation and Permutation Function

    S-Box Construction Based on Linear Fractional Transformation and Permutation Function

  • Linear Cryptanalysis Objectives

    Linear Cryptanalysis Objectives

  • A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes

    A Review of Existing 4-Bit Crypto S-Box Cryptanalysis Techniques and Two New Techniques with 4-Bit Boolean Functions for Cryptanalysis of 4-Bit Crypto S-Boxes

  • Slide Attack and Its Applications a Thesis

    Slide Attack and Its Applications a Thesis

  • Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean

    Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

Top View
  • Analysis of RC2
  • Differential and Linear Cryptanalysis
  • A Study on the Linear Cryptanalysis Ofaes Cipher
  • KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level 1
  • Protecting Against Multidimensional Linear and Truncated Differential
  • Arxiv:1404.6100V4 [Cs.CR] 14 Oct 2014
  • Modern Cryptanalysis.Pdf
  • On the Design and Security of RC2
  • 3GPP KASUMI Evaluation Report
  • Linear and Differential Cryptanalysis of DES C
  • Linear Cryptanalysis of CTC
  • A Single-Key Attack on 6-Round KASUMI
  • Differential-Linear Cryptanalysis Revisited
  • Linear Cryptanalysis Method for DES Cipher
  • Overview of Linear Cryptanalysis on S-DES and Block Ciphers Using Hill Cipher Method
  • A Comparative Study of Rivest Cipher Algorithms
  • Linear Cryptanalysis Using Multiple Linear Approximations
  • Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER


© 2024 Docslib.org    Feedback