DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» NESSIE
NESSIE
Grade 6 Reading Student At–Home Activity Packet
Vector Boolean Functions: Applications in Symmetric Cryptography
Internet Engineering Task Force (IETF) S. Kanno Request for Comments: 6367 NTT Software Corporation Category: Informational M
Nessie Neutrally-Buoyant Elevated System for Satellite Imaging and Evaluation
Study on the Use of Cryptographic Techniques in Europe
Development of a Model for Applying Correlation Cryptanalysis to Filtering Generators
2022 Kientzler Catalog
Year 2010 Issues on Cryptographic Algorithms
2021 4.5'' Premium Potted Annuals
ICEBERG : an Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
Enhancing Hierocrypt-3 Performance by Modifying Its S- Box and Modes of Operations
Authenticated Ciphers D. J. Bernstein University of Illinois at Chicago
On the Applicability of Distinguishing Attacks Against Stream Ciphers
How to Evaluate the Security of Real-Life Cryptographic Protocols? the Cases of ISO/IEC 29128 and CRYPTREC
Simple AEAD Hardware Interface (SÆHI) in a Soc: Implementing an On-Chip Keyak/Whirlbob Coprocessor
4312 NTT Software Corporation Category: Standards Track S. Moriai Sony Computer Entertainment Inc
Stribobr2: “WHIRLBOB”
Simplified Idea Algorithm
Top View
Report on the Development of the Advanced Encryption Standard (AES)
Anything-But Eazy in Hardware
An Overview of Cryptography (Updated Version, 3 March 2016)
Improving the Algebraic Immunity of Resilient and Nonlinear Functions and Constructing Bent Functions
Guidelines on Cryptographic Algorithms Usage and Key Management
View the Index
Search Space Reduction of Asynchrony Immune Cellular Automata by Center Permutivity
Survey of Design and Security Evaluation of Authenticated Encryption Algorithms in the CAESAR Competition∗
Symmetric Algorithm Survey: a Comparative Analysis
Collection North America Kientzler 2021 Triomio – Color Combos with Uniform Performances
A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective
Nessie Report Business and Innovation Needs. Servicing And
Improved Integral Attacks on Reduced Round Camellia
Nessie Proposal: NOEKEON
Download Article (PDF)
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
State of the Art in Lightweight Symmetric Cryptography
CRYPTREC Report 2000 (Provisional Translation)
1 Introduction 2 Discussion
Evaluation of Some Blockcipher Modes of Operation
From Fundamental First-Principle Calculations to Nanoengineering Applications: Review of the NESSIE Project James Kestyn, Eric Polizzi
Simpler Methods for Generating Better Boolean Functions with Good Cryptographic Properties
Attacks Based on Conditional Correlations Against the Nonlinear Filter Generator
The Economic Impacts of the Advanced Encryption Standard, 1996 ‐ 2017
NESSIE Reports [Stream Cipher]
Algebraic Attacks on Stream Ciphers with Linear Feedback
Malaysian Validation Programs Overview
Botan Reference Guide Release 2.18.1
Advanced Encryption Standard - Wikipedia
The Security of ”One-Block-To-Many” Modes of Operation
Hash Functions: Part 2 Macs & Authenticated Ciphers Required Reading
Network Working Group S. Moriai Request for Comments: 3657 Sony Computer Entertainment Inc. Category: Standards Track A