scientific article; zbMATH DE number 1455102
From MaRDI portal
Publication:4484898
zbMath0939.94553MaRDI QIDQ4484898
Publication date: 5 June 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (18)
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems ⋮ Improved Differential Attacks on RC5 ⋮ Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme ⋮ Evaluation of Chaotic Properties Of CBC Mode of Encryption Embedded with RC5 Block Cipher Algorithm ⋮ Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor ⋮ New Results in Linear Cryptanalysis of RC5 ⋮ On the Design and Security of RC2 ⋮ A MAC Mode for Lightweight Block Ciphers ⋮ Good Variants of HB + Are Hard to Find ⋮ Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice ⋮ Construction of bent functions from near-bent functions ⋮ The Cryptanalysis of Reduced-Round SMS4 ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique ⋮ Guaranteeing the diversity of number generators
This page was built for publication: