Showing 1 - 20 results of 21 for search 'Square (cipher)', query time: 0.17s Refine Results
  1. 1
    Published 2002
    Table of Contents: “…Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    Published 1997
    Table of Contents: “… of Ladder-DES -- A family of trapdoor ciphers -- The block cipher Square -- XMX: A firmware-oriented block…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    Published 2002
    Table of Contents: “… Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
    Published 2001
    Table of Contents: “… of Cryptographic Parity Circuits" Proposed at ISW'97 -- Block Ciphers - New Designs -- Camellia: A 128-Bit Block…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 5
    Published 2003
    Table of Contents: “… of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2009
    Table of Contents: “… Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2008
    Table of Contents: “… -- Block Cipher -- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent -- Linear Slide…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2009
    Table of Contents: “… of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2006
    Table of Contents: “… Ciphers -- Hash Functions – I -- Improved Collision Attack on the Hash Function Proposed at PKC’98…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2016
    Table of Contents: “… Research Together at Cipher5 -- Introduction -- Multi-Dimensional Cartography of Aesthetic Systems…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2007
    Table of Contents: “… Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2009
    Table of Contents: “…Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 1997
    Table of Contents: “… on block cipher -- New lower bounds on nonlinearity and a class of highly nonlinear functions…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2008
    Table of Contents: “… -- Computational Soundness of Non-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2007
    Table of Contents: “… Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2009
    Table of Contents: “… the Block Cipher PRESENT -- Practical Attacks on Masked Hardware -- Cryptanalysis of CTC2 -- Alternative…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2003
    Table of Contents: “… Functions Based on Block-Cipher -- Square Hash with a Small Key Size.…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2006
    Table of Contents: “… with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2010
    Table of Contents: “… of Options by Two Approaches -- Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2001
    Table of Contents: “… Multiple Digital Signatures -- Square Attack on Reduced Camellia Cipher -- Generalization of Elliptic Curve…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search