SEAL (cipher)
Top View
- Stream Cipher HC-256 *
- A Survey and Analysis of the Image Encryption Methods
- DSP-128: Stream Cipher Based on Discrete Log Problem and Polynomial Arithmetic
- Attack Surface
- Counter Mode Security: Analysis and Recommendations
- Wed 1354 RISCV-Cryptoextensions-Richardnewell
- On the Role of the Inner State Size in Stream Ciphers
- Stream Cipher the Operation of the Keystream Generator in A5/1, A
- A Security System Using Seal, Blowfish and Idea Algorithm for Credit Card Data
- Ranger Handbook
- A Software-Optimized Encryption Algorithm
- SEAL: Attack Mitigation for Encrypted Databases Via Adjustable Leakage
- A Simple Encryption Algorithm
- Danger of Using Fully Homomorphic Encryption: a Look at Microsoft SEAL
- LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
- Efficient Number Theoretic Transform Implementation on GPU For
- Modified Mclaren-Marsaglia Pseudo- Random Number
- Cryptologic Quarterly Vol. 33