Results 21 to 28 of about 33 (28)

A Salad of Block Ciphers [PDF]

open access: yes, 2017
This book is a survey on the state of the art in block cipher design and analysis. It is work in progress, and it has been for the good part of the last three years -- sadly, for various reasons no significant change has been made during the last twelve
Roberto Avanzi
core  

Hardware Implementations of the WG-16 Stream Cipher with Composite Field Arithmetic [PDF]

open access: yes, 2014
The WG stream cipher family consists of stream ciphers based on the Welch-Gong (WG) transformations that are used as a nonlinear filter applied to the output of a linear feedback shift register (LFSR).
Zidaric, Nusa
core  

Design of Stream Ciphers and Cryptographic Properties of Nonlinear Functions [PDF]

open access: yes, 2007
Block and stream ciphers are widely used to protect the privacy of digital information. A variety of attacks against block and stream ciphers exist; the most recent being the algebraic attacks. These attacks reduce the cipher to a simple algebraic system
Nawaz, Yassir
core  

NASA patent abstracts bibliography: A continuing bibliography. Section 1: Abstracts (supplement 09) [PDF]

open access: yes
This bibliography is issued in two sections: Section 1 - Abstracts, and Section 2 - Indexes. This issue of the Abstract Section cites 200 patents and applications for patent introduced into the NASA scientific and technical information system during the ...

core   +1 more source

Fibre interferometry for differential measurements [PDF]

open access: yes, 2015
This thesis investigates the use of interferometry as an interrogation technology for the measurement of differential length at two widely separate locations.
Smith, Martin Dignan
core  

An Automated Model to Search For Differential Meet-In-The-Middle Attack: Applications to AndRX Ciphers [PDF]

open access: yes
Differential meet-in-the-middle (MITM) cryptanalysis, recently introduced by Boura et al., has emerged as a powerful and versatile technique for assessing the security of modern block cipher designs.
Debasmita Chakraborty   +3 more
core  

The Large Block Cipher Family Vistrutah [PDF]

open access: yes
Vistrutah is a large block cipher with block sizes of 256 and 512 bits. It iterates a step function that applies two AES rounds to each 128-bit block of the state, followed by a state-wide cell permutation.
Bishwajit Chakraborty   +2 more
core  

Symmetric Cryptography for Long-Term Security [PDF]

open access: yes, 2017
Naya-Plasencia, MarĂ­a
core  

Home - About - Disclaimer - Privacy