DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SC2000
SC2000
Vector Boolean Functions: Applications in Symmetric Cryptography
A Preliminary Empirical Study to Compare MPI and Openmp ISI-TR-676
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
A Brief Outlook at Block Ciphers
The Block Cipher SC2000
Basic Cryptanalysis Methods on Block Ciphers
Applying Conditional Linear Cryptanalysis to Ciphers with Key- Dependant Operations
ACUSON SC2000TM Volume Imaging Ultrasound System
Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
Secure Implementation of Block Ciphers Against Physical Attacks Dahmun Goudarzi
Installation Instructions Models SC2000, SC2001, SC3004 Rev
Survey: Block Cipher Methods
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher Jérémy Jean
Differential and Linear Cryptanalysis of a Reduced-Round SC2000
Statistical Cryptanalysis of Block Ciphers
Analysis of SC2000
Searching for Subspace Trails and Truncated Differentials
Related-Cipher Attacks on Block Ciphers with Flexible Number Of
Top View
Colliding Keys for SC2000-256
Block Ciphers
Security Analysis of the Block Cipher SC2000
Searching for Subspace Trails and Truncated Differentials
Arxiv:2009.05859V3 [Cs.RO] 29 Jan 2021 and Does Not Interfere with fluoroscopic Imaging [7]
Sevcon Sc2000 Manual
Table of Contents
Public-Private Sector Relationships in a New Security Environment
A Advanced Encryption Standard See AES AES 35–64 AES Process And
Security Arguments and Tool-Based Design of Block Ciphers
Differential Attack on Five Rounds of the SC2000 Block Cipher⋆
Cryptrec Ex-2204-2012
Generalized Polynomial Decomposition for S-Boxes with Application to Side-Channel Countermeasures
CRYPTREC Report 2000 (Provisional Translation)
This Item Was Submitted to Loughborough's Institutional
Exponential S-Boxes∗
Differential Attack on Five Rounds of the SC2000 Block Cipher⋆
Stream Ciphers
Fast Software Implementations of SC2000