[[abstract]]© 2000 Institute of Information Science Academia Sinica-This paper describes the block cipher SEA2. SEA2 is an evolutionary improvement of SEA. Modifications were made to increase the diffusion achieved per round, thus allowing for greater security and fewer rounds. Like SEA, SEA2 makes essential use of key-dependent permutations and substitutions to provide protection against differential cryptnalysis (DC) and linear cryptnalysis (LC). Our analysis shows that attacks based on DC and LC do not offer any significant improvement over a brute force attack for 4-round SEA2. The C language implementation on 4-round SEA2 could achieve a speed of about 2.9 Mbytes/sec on a 200MHZ Pentium PC, running Windows 95[[department]]電機工程學
Abstract. CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While t...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
SC2000 is a 128-bit block cipher with a user key of 128, 192 or 256 bits, which employs a total of 6...
[[abstract]]© 1999 City Univ. Hong Kong-A new 128-bit block cipher called SEA is proposed. SEA uses ...
In this paper we describe our new CS block cipher which is an extension of the original CS-Ciphe...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
. The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper w...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Cryptographers need to provide the world with a new encryption standard. DES, the major encryption a...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
© Springer-Verlag Berlin Heidelberg 1996. We present the new block cipher SHARK. This cipher combine...
Abstract. CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While t...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
SC2000 is a 128-bit block cipher with a user key of 128, 192 or 256 bits, which employs a total of 6...
[[abstract]]© 1999 City Univ. Hong Kong-A new 128-bit block cipher called SEA is proposed. SEA uses ...
In this paper we describe our new CS block cipher which is an extension of the original CS-Ciphe...
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides...
. The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper w...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
Block ciphers are widely used building blocks for secure communication systems; their purpose is to...
Cryptographers need to provide the world with a new encryption standard. DES, the major encryption a...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
© Springer-Verlag Berlin Heidelberg 1996. We present the new block cipher SHARK. This cipher combine...
Abstract. CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While t...
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communica...
SC2000 is a 128-bit block cipher with a user key of 128, 192 or 256 bits, which employs a total of 6...