scientific article; zbMATH DE number 1498335
From MaRDI portal
Publication:4499412
zbMath0943.94523MaRDI QIDQ4499412
Publication date: 30 August 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (26)
Design of image cipher using Latin squares ⋮ Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems ⋮ Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ Invertible classes ⋮ Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption ⋮ Analysis of bitsum attack on block ciphers ⋮ Exploring confusion in product ciphers through regression analysis ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ FAST: secure and high performance format-preserving encryption and tokenization ⋮ Slender-set differential cryptanalysis ⋮ A single-key attack on the full GOST block cipher ⋮ System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory ⋮ Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor ⋮ Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors ⋮ Higher Order Differential Attack of a CAST Cipher ⋮ Joint Hardware / Software Design of a Fast Stream Cipher ⋮ Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations ⋮ Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ О разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановках ⋮ Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique ⋮ A symmetric cryptographic scheme for data integrity verification in cloud databases ⋮ Reflection Cryptanalysis of Some Ciphers ⋮ Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxes ⋮ Side channel cryptanalysis of product ciphers ⋮ A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs
Uses Software
This page was built for publication: