The following pages link to (Q4484898):
Displaying 18 items.
- Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (Q893871) (← links)
- Construction of bent functions from near-bent functions (Q1024350) (← links)
- Guaranteeing the diversity of number generators (Q1854489) (← links)
- Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions (Q2692350) (← links)
- Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice (Q2822694) (← links)
- On Related-Key Attacks and KASUMI: The Case of A5/3 (Q3104731) (← links)
- Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme (Q3176341) (← links)
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (Q3452345) (← links)
- Improved Differential Attacks on RC5 (Q3452353) (← links)
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES (Q3452355) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- The Cryptanalysis of Reduced-Round SMS4 (Q3644192) (← links)
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor (Q4639345) (← links)
- New Results in Linear Cryptanalysis of RC5 (Q4639436) (← links)
- On the Design and Security of RC2 (Q4639450) (← links)
- A MAC Mode for Lightweight Block Ciphers (Q4639470) (← links)
- Evaluation of Chaotic Properties Of CBC Mode of Encryption Embedded with RC5 Block Cipher Algorithm (Q5087628) (← links)
- Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique (Q5236782) (← links)