DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» M6 (cipher)
M6 (cipher)
Improved Rectangle Attacks on SKINNY and CRAFT
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation
Hash Functions and the (Amplified) Boomerang Attack
Boomerang Analysis Method Based on Block Cipher
Rotational Cryptanalysis of ARX
Historical Ciphers • A
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Full Version)
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
Multiplicative Differentials
Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,”
Multi-Way Ball Valves
AES3 Presentation
Eindhoven University of Technology MASTER Cryptanalysis of Hash
Efficient Quasigroup Block Cipher for Sensor Networks
Statistical Cryptanalysis of Block Ciphers
CS530 Cryptography
SPARC M6-32 Server Architecture
A Simple Power Analysis Attack on the Twofish Key Schedule
Top View
Security Issues with Small Block Sizes
Analysis of Camellia
Analysis of RC2
The Confederated Tribes of the Chehalis Reservation Hazard Mitigation Plan
Bulletin De L'institut Français D'archéologie Orientale
Boomerang Uniformity of Popular S-Box Constructions Shizhu Tian, Christina Boura, Léo Perrin
Some Words About Cryptographic Key Recognition in Data Streams
Cryptanalysis of Symmetric Cryptographic Primitives
Cisco UCS C220 M6 Server Installation and Service Guide
On the Design of Stream Ciphers with Cellular Automata Having Radius = 2
M6/M6T/M6 Exp/M6s/M6 Pro/M55/M58/M5 Exp Diagnostic
A Five-Round Algebraic Property of the Advanced Encryption Standard
A Advanced Encryption Standard See AES AES 35–64 AES Process And
M6: a Chinese Multimodal Pretrainer
Improved Cryptanalysis of Step-Reduced SM3
A Three-Dimensional Block Cipher
1 Background: Uncertainty, Entropy and Conditional Entropy
Encryption Algorithms
A Simple Power Analysis Attack on the Twofish Key Schedule
Twofish: a 128-Bit Block Cipher
Wireless Fever!
A Technical Overview of Oracle Supercluster
Download Project Profile
On the Internal Structure of the Advanced Encryption Standard and Two AES-Based Cryptographic Constructions Jianyong Huang University of Wollongong
Related-Key Attacks Against Reduced-Round Twofish
The SPEED Cipher ?
Design and Implementation a Different Architectures of Mixcolumn in FPGA
Use Style: Paper Title
Stream Ciphers
First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
I-405, SR 522 Vicinity to SR 527 Express Toll Lanes
Mod N Cryptanalysis, with Applications Against RC5P and M6
Block Cipher Encrypting a Large Message Electronic Code Book (ECB)
Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors
How =1=Not to Use a Blockcipher
Cryptanalysis of the ESSENCE Family of Hash Functions