The following pages link to Howard M. Heys (Q1041798):
Displaying 11 items.
- A simple power analysis attack against the key schedule of the Camellia block cipher (Q1041799) (← links)
- Distributed time-memory tradeoff attacks on ciphers (with application to stream ciphers and counter mode) (Q1784446) (← links)
- Substitution-permutation networks resistant to differential and linear cryptanalysis (Q1912767) (← links)
- A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS (Q3452619) (← links)
- (Q4250826) (← links)
- CRYPTANALYSIS OF SUBSTITUTION-PERMUTATION NETWORKS USING KEY-DEPENDENT DEGENERACY (Q4351527) (← links)
- (Q4413322) (← links)
- (Q4418535) (← links)
- Avalanche characteristics of substitution-permutation encryption networks (Q4421187) (← links)
- Information leakage of Feistel ciphers (Q4544451) (← links)
- Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption (Q5280497) (← links)