scientific article; zbMATH DE number 1498335

From MaRDI portal
Revision as of 07:43, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4499412

zbMath0943.94523MaRDI QIDQ4499412

Bruce Schneier

Publication date: 30 August 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (26)

Design of image cipher using Latin squaresTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESInvertible classesChaotic map-embedded Blowfish algorithm for security enhancement of colour image encryptionAnalysis of bitsum attack on block ciphersExploring confusion in product ciphers through regression analysisKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesFAST: secure and high performance format-preserving encryption and tokenizationSlender-set differential cryptanalysisA single-key attack on the full GOST block cipherSystem-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memoryFast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processorOptimizing a fast stream cipher for VLIW, SIMD, and superscalar processorsHigher Order Differential Attack of a CAST CipherJoint Hardware / Software Design of a Fast Stream CipherDifferential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of PermutationsCryptanalysis of PRESENT-Like Ciphers with Secret S-BoxesA Single-Key Attack on the Full GOST Block CipherО разностных свойствах симметричного криптоалгоритма, основанного на псевдодинамических подстановкахMultiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding techniqueA symmetric cryptographic scheme for data integrity verification in cloud databasesReflection Cryptanalysis of Some CiphersExplicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the Gold, and the Bracken-Leander S-boxesSide channel cryptanalysis of product ciphersA Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs


Uses Software






This page was built for publication: