DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SHACAL
SHACAL
Cs 255 (Introduction to Cryptography)
Vmware Java JCE (Java Cryptographic Extension) Module Software Version: 2.0
Cryptanalysis of Selected Block Ciphers
Cryptanalysis of Block Ciphers
The Retracing Boomerang Attack
Statistical Cryptanalysis of Block Ciphers
Research Problems in Block Cipher Cryptanalysis: an Experimental Analysis Amandeep, G
Amplified Boomerang Attack Against Reduced-Round SHACAL
On the Feistel Counterpart of the Boomerang Connectivity Table Hamid Boukerrou, Paul Huynh, Virginie Lallemand, Bimal Mandal, Marine Minier
Statistical Cryptanalysis of Block Ciphers
A Methodology for Differential-Linear Cryptanalysis and Its Applications⋆
Linear Cryptanalysis Combined Attack on Cryptographic Security System
Block Ciphers
Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V
Analysis and Design of Blockcipher Based Cryptographic Algorithms
Totemo Cryptographic Module (TCM) V3.0 FIPS 140-2 Non-Proprietary Security Policy
Collision Resistant If for All (Explicit) “Eff” Algs
Comparison of Symmetric Key Algorithms for Iot Devices
Top View
Short Non-Malleable Codes Fromrelated-Key Secure Block Ciphers
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, and Nathan Keller
Related-Key Boomerang and Rectangle Attacks⋆,⋆⋆
New Automatic Search Tool for Impossible Differentials and Zero
Lecture Notes
Collision Resistant If for All (Explicit) “Eff” Algs
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers
Special Block Cipher Family DN and New
Related-Key Rectangle Attack on 42-Round SHACAL-2
Mitm Attack on Block Cipher Having Simple KSF
LIGHTWEIGHT CRYPTOGRAPHY Cryptographic Engineering for a Pervasive World
Cryptographic Hash Functions K
Related-Key Boomerang Attack on Block Cipher SQUARE
Differential and Rectangle Attacks on Reduced-Round SHACAL-1*
This Item Was Submitted to Loughborough's Institutional
A Novel Methodology for Analysis of the Computational Complexity of Block Ciphers: Rijndael, Camellia and Shacal-2 Compared
Methods of Symmetric Cryptanalysis
Analysis of Boomerang Di Erential Trails Via a SAT-Based Constraint
New Block Cipher: ARIA
A Simple Related-Key Attack on the Full SHACAL-1
A Few Techniques for Block Cipher Cryptanalysis
Stream Ciphers
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis∗
Combined Differential, Linear and Related-Key Attacks on Block