DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Serpent (cipher)
Serpent (cipher)
The First Biclique Cryptanalysis of Serpent-256
Multiple New Formulas for Cipher Performance Computing
Serpent: a Proposal for the Advanced Encryption Standard
Serpenttools Documentation
Differential Factors: Improved Attacks on Serpent
P4-3200-Gentoo.Pdf
Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
Hash Function Luffa Supporting Document
Differential-Linear Cryptanalysis Revisited
LNCS 2887, Pp
Efficient FPGA Implementation of Block Cipher MISTY1
Functional Correctness Proofs of Encryption Algorithms
Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1
SEA a Scalable Encryption Algorithm for Small Embedded Applications
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and Secret Spns
Differential Factors: Improved Attacks on SERPENT
Vertical PDF Slides
Revisiting Key Schedule's Diffusion in Relation with Round Function's
Top View
Amplified Boomerang Attack Against Reduced-Round SHACAL
FIPS 140-2 Security Policy
A Secure and Efficient Lightweight Symmetric Encryption Scheme For
Report on the Development of the Advanced Encryption Standard (AES)
Beecrypt Ciphers: Speed by Data Length P3-1000-Debian-Etch Beecrypt Ciphers: Speed by Data Length Ath-2000-Debian-Etch Beecrypt Ciphers: Speed by Data Length 5 16 30
Slide Attacks FSE 1999 Alex Biryukov David Wagner
Comparison of Symmetric Key Algorithms for Iot Devices
Block Ciphers and Systems of Quadratic Equations
A Methodology for Differential-Linear Cryptanalysis and Its Applications
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Symmetric Algorithm Survey: a Comparative Analysis
A Simple Power Analysis Attack on the Serpent Key Schedule
DLCT: a New Tool for Differential-Linear Cryptanalysis
Related-Key Rectangle Attack on 42-Round SHACAL-2
Bouncy Castle FIPS Java API)
Improbable Differential Attacks on Serpent Using
Serpent: a New Block Cipher Proposal
THE NORSE GOD LOKI AS TRICKSTER by Shawn Christopher Krause-Loner Loki
Slide Attacks
Efficient Slide Attacks⋆
Related-Key Boomerang Attack on Block Cipher SQUARE
SERPENT Modeling of the Transient Reactor Test Facility and Comparison with Measured Experimental Data Joseph Templeton
Implementing Serpent Cipher in Field Programmable Gate Arrays
A Comparative Study of AES, Blowfish, Two Fish and Serpent Cryptography
A Differential-Linear Attack on 12-Round Serpent
Encryption Standard
A Simple Related-Key Attack on the Full SHACAL-1
Data Security in the Cloud Using Serpent Encryption and Distributed Steganography
Cryptanalysis of Block Ciphers: a Survey
Unit 6- Gods, Giants , and Dwarves
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis∗
1E-06 1E-05 0.0001 0.001 0.01 0.1 1 10 100 1000