DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Serpent (cipher)

Serpent (cipher)

  • The First Biclique Cryptanalysis of Serpent-256

    The First Biclique Cryptanalysis of Serpent-256

  • Multiple New Formulas for Cipher Performance Computing

    Multiple New Formulas for Cipher Performance Computing

  • Serpent: a Proposal for the Advanced Encryption Standard

    Serpent: a Proposal for the Advanced Encryption Standard

  • Serpenttools Documentation

    Serpenttools Documentation

  • Differential Factors: Improved Attacks on Serpent

    Differential Factors: Improved Attacks on Serpent

  • P4-3200-Gentoo.Pdf

    P4-3200-Gentoo.Pdf

  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

    Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F

  • Hash Function Luffa Supporting Document

    Hash Function Luffa Supporting Document

  • Differential-Linear Cryptanalysis Revisited

    Differential-Linear Cryptanalysis Revisited

  • LNCS 2887, Pp

    LNCS 2887, Pp

  • Efficient FPGA Implementation of Block Cipher MISTY1

    Efficient FPGA Implementation of Block Cipher MISTY1

  • Functional Correctness Proofs of Encryption Algorithms

    Functional Correctness Proofs of Encryption Algorithms

  • Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1

    Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1

  • SEA a Scalable Encryption Algorithm for Small Embedded Applications

    SEA a Scalable Encryption Algorithm for Small Embedded Applications

  • Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and Secret Spns

    Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and Secret Spns

  • Differential Factors: Improved Attacks on SERPENT

    Differential Factors: Improved Attacks on SERPENT

  • Vertical PDF Slides

    Vertical PDF Slides

  • Revisiting Key Schedule's Diffusion in Relation with Round Function's

    Revisiting Key Schedule's Diffusion in Relation with Round Function's

Top View
  • Amplified Boomerang Attack Against Reduced-Round SHACAL
  • FIPS 140-2 Security Policy
  • A Secure and Efficient Lightweight Symmetric Encryption Scheme For
  • Report on the Development of the Advanced Encryption Standard (AES)
  • Beecrypt Ciphers: Speed by Data Length P3-1000-Debian-Etch Beecrypt Ciphers: Speed by Data Length Ath-2000-Debian-Etch Beecrypt Ciphers: Speed by Data Length 5 16 30
  • Slide Attacks FSE 1999 Alex Biryukov David Wagner
  • Comparison of Symmetric Key Algorithms for Iot Devices
  • Block Ciphers and Systems of Quadratic Equations
  • A Methodology for Differential-Linear Cryptanalysis and Its Applications
  • A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
  • Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
  • Symmetric Algorithm Survey: a Comparative Analysis
  • A Simple Power Analysis Attack on the Serpent Key Schedule
  • DLCT: a New Tool for Differential-Linear Cryptanalysis
  • Related-Key Rectangle Attack on 42-Round SHACAL-2
  • Bouncy Castle FIPS Java API)
  • Improbable Differential Attacks on Serpent Using
  • Serpent: a New Block Cipher Proposal


© 2024 Docslib.org    Feedback