Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction 1.1 Cryptographic Algorithms 3 ................................... 1.2 Block Ciphers 4 ............................................. 1.3 Cryptographer and Cryptanalyst 5 .............................. 1.4 Security 10 .................................................. 1.5 Summary 11 ................................................. 2 DES 2.1 DES Description 14 ........................................... 2.1.1 The Round Function 17 .................................. 2.2 Design Features 2.3 Structural Properties 2.3.2 Weak and Semi-Weak Keys 28 ............................ 2.4 DES Variants 2.4.1 Triple-DES 30 ......................................... 2.4.2 DESX 32 .............................................. 2.5 DES in Context 2.6 Getting to the Source 3 AES 3.1 AES Description 3.1.1 Arithmetic in GF(2") 3.1.2 Encryption with the AES 3.1.3 Decryption with the AES 3.1.4 AES Key Schedule 3.1.5 AES Design Features 3.2 AES State of the Art 3.2.3 Algebraic Analysis 3.2.4 Related-Key Cryptanalysis 3.2.5 Side-Channel Cryptanalysis 3.4 Getting to the Source 4 Using Block Ciphers 4.1 Block Encryption 4.1.2 Cipher Block Chaining Mode 4.2 Stream Encryption 4.2.2 Output Feedback Mode 4.2.3 Counter Mode 4.3 Starting and Finishing 4.3.2 Padding 4.3.3 Ciphertext Stealing 4.4 Authentication 4.4.1 CBC-MAC 4.4.2 OMAC 4.5 Authenticated Encryption 4.5.1 CCM Mode 4.5.2 EAX Mode 4.6 Hashing 4.6.2 Double Block Length Constructions 4.6.3 The SHA-3 Competition 4.7 Getting to the Source 5 Brute Force Attacks 5.1 Time-Memory Trade-offs
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion