DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Threefish

Threefish

  • SHA-3 Conference, March 2012, Skein: More Than Just a Hash Function

    SHA-3 Conference, March 2012, Skein: More Than Just a Hash Function

  • Darxplorer a Toolbox for Cryptanalysis and Cipher Designers

    Darxplorer a Toolbox for Cryptanalysis and Cipher Designers

  • Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)

    Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)

  • A Re-Examine on Assorted Digital Image Encryption Algorithm's

    A Re-Examine on Assorted Digital Image Encryption Algorithm's

  • The Implementation of ”Kuznyechik” Encryption Algorithm Using NVIDIA CUDA Technology

    The Implementation of ”Kuznyechik” Encryption Algorithm Using NVIDIA CUDA Technology

  • Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms

    Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms

  • Security Policy: Java Crypto Module

    Security Policy: Java Crypto Module

  • An Efficient Implementation of the Blowfish Encryption Algorithm

    An Efficient Implementation of the Blowfish Encryption Algorithm

  • The Dblock Family of Block Ciphers

    The Dblock Family of Block Ciphers

  • Security of Authenticated Encryption Modes

    Security of Authenticated Encryption Modes

  • Understanding How to Prevent Sensitive Data Exposure

    Understanding How to Prevent Sensitive Data Exposure

  • Side-Channel Analysis of Keccak and Ascon

    Side-Channel Analysis of Keccak and Ascon

  • Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes

    Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes

  • Defacement of Colluding Attack Using Blowfish Algorithm

    Defacement of Colluding Attack Using Blowfish Algorithm

  • Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm

    Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm

  • Improving the Sphinx Mix Network

    Improving the Sphinx Mix Network

  • A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256

    A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256

  • View the Index

    View the Index

Top View
  • Compact Implementation of Threefish and Skein on FPGA
  • Tweak-Length Extension for Tweakable Blockciphers⋆
  • Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 ?
  • Application to Efficient Generation of Pseudorandom Numbers In
  • Level 3 Advanced Technical Extended Diploma in Digital Technologies (720) (5220-32)
  • Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
  • Tweaking Even-Mansour Ciphers
  • HARDWARE IMPLEMENTATION of ADVANCED CRYPTOGRAPHIC HASH FUNCTION on Fpgas
  • Symmetric Encryption Algorithms: Review and Evaluation Study
  • Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
  • Boomerang Attacks on Hash Function Using Auxiliary Differentials
  • A Few Thoughts on Cryptographic Engineering: Search Results for Authenticated
  • International Journal of Engineering Technology Research & Management
  • Blowfish-128: a Modified Blowfish Algorithm That Supports 128-Bit Block Size
  • Tweakable Ciphers: Constructions and Applications
  • Design and Implementation of Threefish Cipher Algorithm in PNG File
  • A Review and Comparative Analysis of Various Encryption Algorithms
  • Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis


© 2024 Docslib.org    Feedback