DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Threefish
Threefish
SHA-3 Conference, March 2012, Skein: More Than Just a Hash Function
Darxplorer a Toolbox for Cryptanalysis and Cipher Designers
Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM)
A Re-Examine on Assorted Digital Image Encryption Algorithm's
The Implementation of ”Kuznyechik” Encryption Algorithm Using NVIDIA CUDA Technology
Comparative Analysis of AES, Blowfish, Twofish and Threefish Encryption Algorithms
Security Policy: Java Crypto Module
An Efficient Implementation of the Blowfish Encryption Algorithm
The Dblock Family of Block Ciphers
Security of Authenticated Encryption Modes
Understanding How to Prevent Sensitive Data Exposure
Side-Channel Analysis of Keccak and Ascon
Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Defacement of Colluding Attack Using Blowfish Algorithm
Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm
Improving the Sphinx Mix Network
A New Related-Key Boomerang Distinguishing Attack of Reduced-Round Threefish-256
View the Index
Top View
Compact Implementation of Threefish and Skein on FPGA
Tweak-Length Extension for Tweakable Blockciphers⋆
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 ?
Application to Efficient Generation of Pseudorandom Numbers In
Level 3 Advanced Technical Extended Diploma in Digital Technologies (720) (5220-32)
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Tweaking Even-Mansour Ciphers
HARDWARE IMPLEMENTATION of ADVANCED CRYPTOGRAPHIC HASH FUNCTION on Fpgas
Symmetric Encryption Algorithms: Review and Evaluation Study
Mcoe: a Family of Almost Foolproof On-Line Authenticated Encryption Schemes
Boomerang Attacks on Hash Function Using Auxiliary Differentials
A Few Thoughts on Cryptographic Engineering: Search Results for Authenticated
International Journal of Engineering Technology Research & Management
Blowfish-128: a Modified Blowfish Algorithm That Supports 128-Bit Block Size
Tweakable Ciphers: Constructions and Applications
Design and Implementation of Threefish Cipher Algorithm in PNG File
A Review and Comparative Analysis of Various Encryption Algorithms
Copyright by Gokhan Sayilar 2014 the Thesis Committee for Gokhan Sayilar Certifies That This Is the Approved Version of the Following Thesis
Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
Optimal Prfs from Blockcipher Designs
Analysis of ARX Functions: Pseudo-Linear Methods for Approximation, Differentials, and Evaluating Diffusion
SHA-3 Submission: Skein Hash Function Family Jarrick Goldhamer
Authenticated Encryption Modes for Tweakable Block Ciphers?
Improved Cryptanalysis of Skein
Use Style: Paper Title
Group 2: Skein, ECHO, Dynamic SHA2, ESSENCE
Bestcrypt Container Encryption Help File for Windows
Report Status Declaration Form
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
A Comprehensive Comparison of Symmetric Cryptographic Algorithms by Using Multiple Types of Parameters
Methods of Symmetric Cryptanalysis
Critical Analysis of Various Cryptographic Algorithms
Cryptanalysis of Selected Block Ciphers
PAEQ: Parallelizable Permutation-Based Authenticated Encryption (Full Version)
Skein and Threefish Implementation on FPGA
The Skein Hash Function Family
US 2014/0237252 A1 Hursti (43) Pub
Botan Reference Guide Release 2.18.1
Jetico User Manual
The Skien Hash Function