scientific article; zbMATH DE number 1455102
From MaRDI portal
Publication:4484898
zbMATH Open0939.94553MaRDI QIDQ4484898FDOQ4484898
Authors: Ronald L. Rivest
Publication date: 5 June 2000
Title of this publication is not available (Why is that?)
Recommendations
Cited In (22)
- A cryptographic encryption technique byte-spiral rotation encryption algorithm
- The Cryptanalysis of Reduced-Round SMS4
- On related-key attacks and KASUMI: the case of A5/3
- Guaranteeing the diversity of number generators
- Correlation power analysis of lightweight block ciphers: from theory to practice
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
- Improved differential attacks on RC5
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Good Variants of HB + Are Hard to Find
- Title not available (Why is that?)
- Construction of bent functions from near-bent functions
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Evaluation of chaotic properties of CBC mode of encryption embedded with RC5 block cipher algorithm
- Cryptanalysis of a chaotic stream cipher and its improved scheme
- New Results in Linear Cryptanalysis of RC5
- A MAC mode for lightweight block ciphers
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
- The Multics encipher_Algorithm
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions
- Quantum algorithm for finding impossible differentials and zero-correlation linear hulls of symmetric ciphers
- On the design and security of RC2
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484898)