Výsledky vyhľadávania - "Key scheduling algorithm"
-
1
Autori: a ďalší
Predmety: Avalanche effect, Data encryption standard, Hamming weight, Key scheduling algorithm, Symmetric key encryption
Relation: https://zenodo.org/records/17034957; oai:zenodo.org:17034957; https://doi.org/10.11591/eei.v14i4.9712
-
2
Autori: mohammed, Faisal
Zdroj: Journal of Engineering and Computer Science (JECS); Vol 17, No 1 (2016); 39-42 ; 1858-6791 ; 1858-6783
-
3
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: Journal of Telecommunication, Electronic and Computer Engineering (JTEC); Vol 9, No 3-5: Special Issue on Software Engineering III; 1-6 ; 2289-8131 ; 2180-1843
Popis súboru: application/pdf
-
4
Autori:
Zdroj: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2008, E91.A(1):3
-
5
Autori:
Prispievatelia:
Predmety: RC4, kryptoanalýza, stavová tabulka, proudová šifra, Key Scheduling Algorithm, Cryptanalysis, State Table, Stream Cipher
Popis súboru: application/pdf; application/octet-stream
Relation: http://hdl.handle.net/20.500.11956/73977; 173365; 002102864; 990021028640106986
Dostupnosť: https://hdl.handle.net/20.500.11956/73977
-
6
Autori:
Prispievatelia:
Predmety: State Table, Key Scheduling Algorithm, RC4, stavová tabulka, Cryptanalysis, proudová šifra, Stream Cipher, kryptoanalýza
Prístupová URL adresa: http://www.nusl.cz/ntk/nusl-343310
http://www.nusl.cz/ntk/nusl-474808 -
7
Autori:
Prispievatelia:
Zdroj: http://www.idosi.org/wasj/wasj19(11)12/15.pdf.
Predmety: Cryptography Network Security Key scheduling algorithm Subkey Generation Block Ciphering Algorithm A
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.390.2378; http://www.idosi.org/wasj/wasj19(11)12/15.pdf
Dostupnosť: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.390.2378
http://www.idosi.org/wasj/wasj19(11)12/15.pdf -
8
Autori: a ďalší
Prispievatelia: a ďalší
Predmety: Bias, Cryptography, Cryptanalysis, Key Scheduling Algorithm, RC4, Stream Cipher
Popis súboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5298; http://eprint.iacr.org/2007/305.pdf
-
9
Autori: a ďalší
Predmety: Impossible differential cryptanalysis, key recovery attack, non-linear key scheduling algorithm, LBlock, envir, eco
Relation: http://hdl.handle.net/10119/12947
Dostupnosť: http://hdl.handle.net/10119/12947
-
10
Autori: a ďalší
Predmety: Impossible differential cryptanalysis, key recovery attack, non-linear key scheduling algorithm, LBlock
Popis súboru: application/pdf
Relation: http://hdl.handle.net/10119/12947
Dostupnosť: http://hdl.handle.net/10119/12947
-
11
Autori: a ďalší
Témy: Impossible differential cryptanalysis, key recovery attack, non-linear key scheduling algorithm, LBlock, Journal Article., AM.
-
12
Autori: a ďalší
Témy: Impossible differential cryptanalysis, key recovery attack, non-linear key scheduling algorithm, LBlock, Journal Article, AM
-
13
Autori: Z'aba, Muhammad Reza
Témy: block cipher, stream cipher, symmetric cipher, linear transformation, diffusion, cryptanalysis, fixed points, round function, key scheduling algorithm, integral attack, bit-pattern, algebraic analysis, system of equations, branch number, AES, ARIA, LEX, BES, Noekeon, PRESENT, Serpent, SMS4, Thesis
URL:
https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf https://eprints.qut.edu.au/35725/2/Muhammad_Z%27aba_Citation.pdf https://eprints.qut.edu.au/35725/1/Muhammad_Z%27aba_Thesis.pdf https://eprints.qut.edu.au/35725/2/Muhammad_Z%27aba_Citation.pdf
Z'aba, Muhammad Reza (2010) Analysis of linear relationships in block ciphers. PhD thesis, Queensland University of Technology.
Nájsť tento článok vo Web of Science