Serpent (cipher)
Top View
- Amplified Boomerang Attack Against Reduced-Round SHACAL
- FIPS 140-2 Security Policy
- A Secure and Efficient Lightweight Symmetric Encryption Scheme For
- Report on the Development of the Advanced Encryption Standard (AES)
- Beecrypt Ciphers: Speed by Data Length P3-1000-Debian-Etch Beecrypt Ciphers: Speed by Data Length Ath-2000-Debian-Etch Beecrypt Ciphers: Speed by Data Length 5 16 30
- Slide Attacks FSE 1999 Alex Biryukov David Wagner
- Comparison of Symmetric Key Algorithms for Iot Devices
- Block Ciphers and Systems of Quadratic Equations
- A Methodology for Differential-Linear Cryptanalysis and Its Applications
- A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
- Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
- Symmetric Algorithm Survey: a Comparative Analysis
- A Simple Power Analysis Attack on the Serpent Key Schedule
- DLCT: a New Tool for Differential-Linear Cryptanalysis
- Related-Key Rectangle Attack on 42-Round SHACAL-2
- Bouncy Castle FIPS Java API)
- Improbable Differential Attacks on Serpent Using
- Serpent: a New Block Cipher Proposal