Linked e-resources

Details

Intro; Preface; List of Acronyms; List of Symbols; Contents; Chapter 1 Introduction; Abstract; 1.1 Symmetric and Asymmetric Ciphers; 1.2 Iterated (or Product) Ciphers; 1.3 Symmetric Cryptosystems; 1.4 Entropy; 1.5 Confusion and Diffusion; 1.6 Security Assumptions and Threat Models; 1.7 PRP and SPRP; 1.8 Modes of Operation; 1.9 Unconditional Security; 1.10 The Origins of the MESH Ciphers; References; Chapter 2 Lai-Massey Block Ciphers; Abstract; 2.1 The PES Block Cipher; 2.1.1 Encryption and Decryption Frameworks; 2.1.2 Key Schedule Algorithm; 2.2 The IDEA Block Cipher

2.2.1 Encryption and Decryption Frameworks2.2.2 Key Schedule Algorithm; 2.3 The MESH Block Ciphers; 2.3.1 Encryption and Decryption Frameworks of MESH-64; 2.3.2 Key Schedule Algorithm of MESH-64; 2.3.3 Encryption and Decryption Frameworks of MESH-96; 2.3.4 Key Schedule Algorithm of MESH-96; 2.3.5 Encryption and Decryption Frameworks of MESH-128; 2.3.6 Key Schedule Algorithm of MESH-128; 2.3.7 Encryption and Decryption Frameworks of MESH-64(8); 2.3.8 Key Schedule Algorithm of MESH-64(8); 2.3.9 Encryption and Decryption Frameworks of MESH-128(8); 2.3.10 Key Schedule Algorithm of MESH-128(8)

2.4 The RIDEA Block Cipher2.4.1 Encryption and Decryption Frameworks; 2.4.2 Key Schedule Algorithm; 2.5 The WIDEA- Block Ciphers; 2.5.1 Encryption and Decryption Frameworks; 2.5.2 Key Schedule Algorithms; 2.6 The FOX/IDEA-NXT Block Ciphers; 2.6.1 Encryption and Decryption Frameworks; 2.6.2 Key Schedule Algorithms; 2.7 The REESSE3+ Block Cipher; 2.7.1 Encryption and Decryption Frameworks; 2.7.2 Key Schedule Algorithm; 2.8 The IDEA* Block Cipher; 2.8.1 Encryption and Decryption Frameworks; 2.8.2 Key Schedule Algorithm; 2.9 The Yi's Block Cipher; 2.9.1 Encryption and Decryption Frameworks

2.9.2 Key Schedule Algorithm2.10 The Bel-T Block Cipher; 2.10.1 Encryption and Decryption Frameworks; 2.10.2 Key Schedule Algorithm; References; Chapter 3 Attacks; Abstract; 3.1 Exhaustive Search (Brute Force) Attack; 3.2 Dictionary Attack; 3.3 Birthday-Paradox Attacks; 3.3.1 Generalized Birthday Paradox Attack; 3.4 Time-Memory Trade-Off Attacks; 3.4.1 Hellman's Attack; 3.4.2 Time/Memory/Data Trade-Off Attacks; 3.5 Differential Cryptanalysis; 3.5.1 DC of PES Under Weak-Key Assumptions; 3.5.1.1 Key-Recovery Attacks; 3.5.2 DC of IDEA Under Weak-Key Assumptions; 3.5.2.1 Key-Recovery Attacks

3.5.3 DC of MESH-64 Under Weak-Key Assumptions3.5.4 DC of MESH-96 Under Weak-Key Assumptions; 3.5.5 DC of MESH-128 Under Weak-Key Assumptions; 3.5.6 DC of MESH-64(8) Under Weak-Key Assumptions; 3.5.7 DC of MESH-128(8) Under Weak-Key Assumptions; 3.5.8 DC of WIDEA-n Under Weak-Key Assumptions; 3.5.8.1 Differential Attack Using One IDEA Instance Only; 3.5.8.2 Differential Attack Using All IDEA Instances; 3.5.8.3 WIDEA-n in Davies-Meyer Mode; 3.5.8.4 Weak Keys; 3.5.8.5 Weak Keys in WIDEA-4; 3.5.8.6 Weak keys in WIDEA-8; 3.5.9 DC of RIDEA Under Weak-Key Assumptions

Browse Subjects

Show more subjects...

Statistics

from
to
Export