DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Q (cipher)

Q (cipher)

  • Integral Cryptanalysis on Full MISTY1⋆

    Integral Cryptanalysis on Full MISTY1⋆

  • New Security Proofs for the 3GPP Confidentiality and Integrity

    New Security Proofs for the 3GPP Confidentiality and Integrity

  • Known and Chosen Key Differential Distinguishers for Block Ciphers

    Known and Chosen Key Differential Distinguishers for Block Ciphers

  • Differential-Linear Crypt Analysis

    Differential-Linear Crypt Analysis

  • Algebraic and Slide Attacks on Keeloq

    Algebraic and Slide Attacks on Keeloq

  • TS 135 202 V7.0.0 (2007-06) Technical Specification

    TS 135 202 V7.0.0 (2007-06) Technical Specification

  • Miss in the Middle Attacks on IDEA and Khufu

    Miss in the Middle Attacks on IDEA and Khufu

  • Shift Cipher Substitution Cipher Vigenère Cipher Hill Cipher

    Shift Cipher Substitution Cipher Vigenère Cipher Hill Cipher

  • Improbable Differential from Impossible Differential

    Improbable Differential from Impossible Differential

  • Pseudorandomness of Basic Structures in the Block Cipher KASUMI

    Pseudorandomness of Basic Structures in the Block Cipher KASUMI

  • 1. Classical Cryptography

    1. Classical Cryptography

  • Differential-Linear Cryptanalysis Revisited

    Differential-Linear Cryptanalysis Revisited

  • Introduction to the Block Cipher KASUMI

    Introduction to the Block Cipher KASUMI

  • Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1

    Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1

  • Related-Key Cryptanalysis of AES, Hierocrypt-3, and Cipherunicorn-A

    Related-Key Cryptanalysis of AES, Hierocrypt-3, and Cipherunicorn-A

  • Cryptanalysis of Reduced Round SKINNY Block Cipher

    Cryptanalysis of Reduced Round SKINNY Block Cipher

  • Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean

    Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean

  • Q-Series Basic Course ( for GX Works2 )

    Q-Series Basic Course ( for GX Works2 )

Top View
  • Shift Cipher
  • Differential and Linear Cryptanalysis
  • KASUMI Specification
  • Research Article Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques
  • 3GPP KASUMI Evaluation Report
  • Breaking ECDSA with Less Than One Bit of Nonce Leakage
  • Collection of Tolkien Filksongs
  • Encrypted Search: Leakage Attacks Seny Kamara How Do We Deal with Leakage?
  • Impossible Differential Cryptanalysis of Reduced Round Hight
  • Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
  • Tweakable Block Ciphers
  • The Montgomery Ladder on Binary Elliptic Curves
  • Improved Impossible Differential Cryptanalysis of Large-Block Rijndael
  • LINEAR and DIFFERENTIAL CRYPTANALYSIS of REDUCED-ROUND AES 1. Introduction
  • Introduction to Public Key Cryptography
  • Impossible Differential Cryptanalysis of Reduced Round SIMON
  • Improvements for Finding Impossible Differentials of Block Cipher
  • Topic 1: Cryptography 1 Introduction to Cryptography


© 2024 Docslib.org    Feedback