DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» UES (cipher)
UES (cipher)
An Integrated Symmetric Key Cryptographic Method
Investigation of Some Cryptographic Properties of the 8X8 S-Boxes Created by Quasigroups
Security Evaluation of the K2 Stream Cipher
Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
New Cryptanalysis of Block Ciphers with Low Algebraic Degree
S3-020672 Group Release Function
Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau
UES Application Report
Cryptanalysis of Full Sprout ∗
Rockpoint Acquires UES Highrise for $218M with Wells Fargo Loan
An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains
Public-Key Cryptanalysis
RACE: Randomized Counter Mode of Authenticated Encryption Using Cellular Automata
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and Forkskinny
Report on the Development of the Advanced Encryption Standard (AES)
Comparison of Encryption Algorithms Strength Used in 3G Mobile Communication
Top View
Key-Dependent S-Box Manipulations
Cryptanalyses of Some Multimedia Encryption Schemes
A Design Methodology for Secured Ics Using Dynamic Current Mode Logic
Cryptanalysis of Symmetric Cryptographic Primitives
JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU
Green Cryptanalysis: Meet-In-The-Middle Key-Recovery for the Full KASUMI Cipher ?
Original Papers
Block Ciphers
Practical Applications of Homomorphic Encryption
Tweakable Block Ciphers
A Advanced Encryption Standard See AES AES 35–64 AES Process And
Improved Impossible Differential Cryptanalysis of Large-Block Rijndael
Cryptanalysis of Reduced-Round SIMON32 and SIMON48⋆
JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU (V1)
Twofish: a 128-Bit Block Cipher
New Impossible Differential Attacks On
Analysis of Brute-Force Attack in UES Over DES
Improbable Differential Cryptanalysis
Partitioning Oracle Attacks
How to Abuse and Fix Authenticated Encryption Without Key Commitment
UMTS); LTE; 3G Security; Security Architecture (3GPP TS 33.102 Version 9.4.0 Release 9
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data ⋆
A Very Compact “Perfectly Masked” S-Box for AES (Corrected)
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full Printcipher-48
The First Experimental Cryptanalysis of the Data Encryption Standard
Data Encryption Standard, As Specified in FIPS Publication 46- = = + 3 [31], Is a Block Cipher Operating on 64-Bit Data L2 R1 R2 L1 F(R1, K2) Blocks
Impossible Differential Cryptanalysis on Deoxys-BC-256
Ultra Encryption Standard (UES) Version-II: Symmetric Key
Professor and Multimedia Artist Kasumi Wins Guggenheim Award
Ultra Encryption Standard (UES) Version-III: Advanced Symmetric Key Cryptosystem with Bit-Level Encryption Algorithm
Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback
On the Use of Shamir's Secret Sharing Against Side-Channel Analysis
Design and Analysis of Cryptographic Algorithms
Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
Key-Schedule Cryptanalysis of DEAL
Eigenvalue Methods for Interpolation Bases
The 128-Bit Blockcipher CLEFIA Security and Performance Evaluations
Hardware Performance of Elmd and Elmd(6,6) Lilian Bossuet, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi
Partitioning Oracle Attacks
Seed and Seedling Traits Have Strong Impacts on Establishment of a Perennial Bunchgrass in Invaded Semi-Arid Systems
Stream Ciphers
Ultra Encryption Standard (UES) Version-IV: New Symmetric Key Cryptosystem with Bit-Level Columnar Transposition and Reshuffling of Bits
Differential Fault Analysis on AES with 192 and 256-Bit Keys
Hidden Structures and Quantum Cryptanalysis Xavier Bonnetain
Impossible Differential Attack on Reduced Round SPARX-64/128
Mod N Cryptanalysis, with Applications Against RC5P and M6
How JRR Tolkien Used Original Intertext to Create Middle-Earth