DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» NOEKEON
NOEKEON
Cryptographic Sponge Functions
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS (Full Version)
Modes of Operation for Compressed Sensing Based Encryption
Truncated Differential Analysis of Round-Reduced Roadrunner
Improved Side Channel Attack on the Block Cipher NOEKEON
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
A Re-Examine on Assorted Digital Image Encryption Algorithm's
Cryptography
Feature Comparison for GUI Keystore Managers
Differential Cryptanalysis on Lblock Using Differential Factors
SKINNY-AEAD and SKINNY-Hash Specification
Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery
Bahles of Cryptographic Algorithms
Analysis of Linear Relationships in Block Ciphers
Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
Mind the Gap - a Closer Look at the Security of Block Ciphers Against Differential Cryptanalysis
Permutation-Based Encryption, Authentication and Authenticated Encryption
Top View
Challenges in Lightweight Crypto Standardization
Secure Block Ciphers - Cryptanalysis and Design
Block Ciphers PRESENT and SEA in Comparison
Adiantum: Length-Preserving Encryption for Entry-Level Processors
Malicious Keccak
Stribobr2: “WHIRLBOB”
Beecrypt Ciphers: Speed by Data Length P3-1000-Debian-Etch Beecrypt Ciphers: Speed by Data Length Ath-2000-Debian-Etch Beecrypt Ciphers: Speed by Data Length 5 16 30
Block Ciphers
View the Index
Algorithms, Key Size and Parameters Report – 2014
Introduction to Symmetric Cryptography
Comparison of Symmetric Key Algorithms for Iot Devices
Keccak Implementation Overview
Libtomcrypt Developer Manual
Integral Cryptanalysis of the Block Cipher E2
My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
Two-Round AES Differentials*
Improbable Differential Cryptanalysis and Undisturbed Bits
Saturnin: a Suite of Lightweight Symmetric Algorithms for Post-Quantum Security Version 1.1 (September 27, 2019)
Kobe University Repository : Thesis
KNOT: Algorithm Specifications and Supporting Document
New and Old Limits for AES Known-Key Distinguishers
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Cryptographic Hash Functions
Algebraic Precomputations in Differential and Integral Cryptanalysis
The Design of Rijndael
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
The Design and Analysis of Symmetric Cryptosystems
Improbable Differential Cryptanalysis
The K Reference
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Rigorous Analysis of Truncated Differentials for 5-Round
Bitslice Ciphers and Power Analysis Attacks
Nessie Proposal: NOEKEON
Bitslice Encryption for Efficient Masked Software Implementations
On the Security of NOEKEON Against Side Channel Cube Attacks
Methods of Symmetric Cryptanalysis
Case Studies of Performance Evaluation of Cryptographic Algorithms for an Embedded System and a General Purpose Computer
RECTANGLE: a Bit-Slice Lightweight Block Cipher Suitable for Multiple Platforms
Security II: Cryptography
Algebraic and Side-Channel Analysis of Lightweight Block Ciphers Shekh Faisal Abdul Latip University of Wollongong
Towards a Lightweight Cryptography Standard
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID
Cryptographic Contests: Toward Fair and Comprehensive Benchmarking of Cryptographic Algorithms in Hardware
Sponge Functions
Cryptanalysis of Selected Block Ciphers
FIPS Publication 202: SHA-3 Standard: Permutation-Based Hash
Stream Ciphers
Migration of the Perfect Cipher to the Current Computing Environment
Cryptography and Computer Security
Adiantum: Length-Preserving Encryption for Entry-Level Processors
Bit-Pattern Based Integral Attack
Botan Reference Guide Release 2.18.1
The Skinny Family of Tweakable Block Ciphers
The Marvin Message Authentication Code and the Lettersoup Authenticated Encryption Scheme
1E-06 1E-05 0.0001 0.001 0.01 0.1 1 10 100 1000 10000
Secure Block Ciphers - Cryptanalysis and Design
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Cryptography. Theory and Practice-CRC Press
Security Analysis of Cryptographic Algorithms
Protecting the NOEKEON Cipher Against SCARE Attacks in Fpgas by Using Dynamic Implementations