Results 21 to 28 of about 33 (28)
A Salad of Block Ciphers [PDF]
This book is a survey on the state of the art in block cipher design and analysis. It is work in progress, and it has been for the good part of the last three years -- sadly, for various reasons no significant change has been made during the last twelve
Roberto Avanzi
core
Hardware Implementations of the WG-16 Stream Cipher with Composite Field Arithmetic [PDF]
The WG stream cipher family consists of stream ciphers based on the Welch-Gong (WG) transformations that are used as a nonlinear filter applied to the output of a linear feedback shift register (LFSR).
Zidaric, Nusa
core
Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions [PDF]
Block and stream ciphers are widely used to protect the privacy of digital information. A variety of attacks against block and stream ciphers exist; the most recent being the algebraic attacks. These attacks reduce the cipher to a simple algebraic system
Nawaz, Yassir
core
NASA patent abstracts bibliography: A continuing bibliography. Section 1: Abstracts (supplement 09) [PDF]
This bibliography is issued in two sections: Section 1 - Abstracts, and Section 2 - Indexes. This issue of the Abstract Section cites 200 patents and applications for patent introduced into the NASA scientific and technical information system during the ...
core +1 more source
Fibre interferometry for differential measurements [PDF]
This thesis investigates the use of interferometry as an interrogation technology for the measurement of differential length at two widely separate locations.
Smith, Martin Dignan
core
An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers [PDF]
Differential meet-in-the-middle (MITM) cryptanalysis, recently introduced by Boura et al., has emerged as a powerful and versatile technique for assessing the security of modern block cipher designs.
Debasmita Chakraborty +3 more
core
The Large Block Cipher Family Vistrutah [PDF]
Vistrutah is a large block cipher with block sizes of 256 and 512 bits. It iterates a step function that applies two AES rounds to each 128-bit block of the state, followed by a state-wide cell permutation.
Bishwajit Chakraborty +2 more
core

