Dissertation 

About 27 item dissertation in line with differential cryptanalysis query results,the following is 1 to 50(Search took 0.023 seconds)

  1. Security Analysis on Block-Like Type Stream Ciphers,ZhangZhongYa/PLA Information Engineering University,0/28
  2. Security Analysis of Several Block Cipher Models,WangJianKang/PLA Information Engineering University,0/0
  3. Security Analysis on Three Typical Kinds of Hybrid Symmetric Ciphers,ZhangKai/PLA Information Engineering University,0/0
  4. The Extended Differential Cryptanalysis on Three SPN Block Ciphers,LiuJia/PLA Information Engineering University,0/0
  5. The Analysis of Differential Probability Based on Arithmetic Operation in Block Cipher,HuangYuanMin/Central China Normal University,0/2
  6. Security Analysis and Related-Key Attack on Kasumi Algorithm,KongFanJie/PLA Information Engineering University,0/23
  7. Research on Computing Method of the Differential Probability of SPS Structure,LiuGuoQiang/PLA Information Engineering University,0/26
  8. Security Research Based on Chaotic Block Cipher,ZhengZuo/Xi'an University of Electronic Science and Technology,0/38
  9. Research on Security of Block Cipher SMS4,ShiTao/Shandong University,0/55
  10. Cryptanalysis of Light-Weight and Large Non-surjective S-box Block Ciphers,SunYue/Shandong University,0/147
  11. Cryptanalysis for Iterated Block Function,MaoMing/University of Electronic Science and Technology,1/82
  12. Structural Analysis of Symmetric-key Algorithms and Hash Functions,LuoYiYuan/Shanghai Jiaotong University,0/110
  13. Research on Impossible Differential Cryptanalysis and Algebraic Cryptanalysis of Some Block Ciphers,LiuYa/Shanghai Jiaotong University,0/135
  14. Cryptanalysis of Two Symmetric Encryption Algorithms ARIA and SALSA20,LiShenHua/Shandong University,9/333
  15. On the Theory and Some Key Techniques of Block Ciphers,GuDaWu/Xi'an University of Electronic Science and Technology,19/540
  16. Techniques for Cryptanalysis of Block Ciphers,ChenJie/Xi'an University of Electronic Science and Technology,3/377
  17. Cryptanalysis of Block Cipher Clefia and Macs Based on Four Rounds AES,WangZuo/Shandong University,0/215
  18. Impossible Differential Cryptanalysis and Meet-in-the-Middle Attack on ARIA,DuChengHang/Shandong University,0/83
  19. The design and analysis of block cipher,DuoLei/People's Liberation Army National Defense University of Science and Technology,12/296
  20. Analysis and Application of Nonlinear Combination Sequence,WangWenLing/National University of Defense Science and Technology,2/94
  21. Differential Cryptanalysis and Linear Cryptanalysis: Theory, Characteristics and Application,ShenJing/National University of Defense Science and Technology,1/474
  22. The third generation mobile communication system encryption and authentication algorithms Analysis and Simulation,MaSuoTang/University of Electronic Science and Technology,1/196
  23. Research on Technology of Differential Cryptanalysis in Cipher System,ChenXiaoGuang/Xi'an University of Electronic Science and Technology,3/197
  24. Cryptanalysis of Block Cipher Blow-CAST-Fish,SunXiaoLing/Shandong University,2/85
  25. Russia Cryptographic Service System,YuanKe/Guizhou University,0/36
  26. Security Test on Key Components of Block Ciphers and Research on Practical Securty Against Differential Cryptanalysis and Linear Cryptanalysis,ChaiLi/PLA Information Engineering University,0/42
  27. Research of the Block Ciphers’ Capability to Asist the Differential Cryptanalysis,GuHaiWen/PLA Information Engineering University,0/72

Total 1 Pages First Previous 1 Next Last

© 2012 www.DissertationTopic.Net  Mobile