DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Serge Vaudenay

Serge Vaudenay

  • Multiplicative Differentials

    Multiplicative Differentials

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Dossier De Presse (Mai 2019) Press Release (May 2019)

    Dossier De Presse (Mai 2019) Press Release (May 2019)

  • Decorrelation: a Theory for Block Cipher Security

    Decorrelation: a Theory for Block Cipher Security

  • Resistance Against Iterated Attacks by Decorrelation Revisited

    Resistance Against Iterated Attacks by Decorrelation Revisited

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Statistical Cryptanalysis of Block Ciphers

    Statistical Cryptanalysis of Block Ciphers

  • Standard Grant Application Form

    Standard Grant Application Form

  • Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

    Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

  • Tweakable Block Ciphers

    Tweakable Block Ciphers

  • Provable Security of Block Ciphers Against Linear Cryptanalysis - a Mission Impossible?

    Provable Security of Block Ciphers Against Linear Cryptanalysis - a Mission Impossible?

  • Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

    Linear Cryptanalysis of Non Binary Ciphers with an Application to SAFER

  • Linear Cryptanalysis of Non Binary Ciphers (With an Application to SAFER)

    Linear Cryptanalysis of Non Binary Ciphers (With an Application to SAFER)

  • AES Candidate C

    AES Candidate C

  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis

    Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis

  • A CLASSICAL INTRODUCTION to CRYPTOGRAPHY Applications for Communications Security a CLASSICAL INTRODUCTION to CRYPTOGRAPHY Applications for Communications Security

    A CLASSICAL INTRODUCTION to CRYPTOGRAPHY Applications for Communications Security a CLASSICAL INTRODUCTION to CRYPTOGRAPHY Applications for Communications Security

  • XMX: a Firmware-Oriented Block Cipher Based on Modular Multiplications

    XMX: a Firmware-Oriented Block Cipher Based on Modular Multiplications

  • The Boomerang Attack

    The Boomerang Attack

Top View
  • FOX : a New Family of Block Ciphers*


© 2024 Docslib.org    Feedback