Analysis and linear cryptanalysis of the RC5 block cipher .

Download
2002
İnce, Özgür

Suggestions

Analysis of a PVM inverter driven induction machine.
Kılıçarslan, Behçet; Department of Electrical Engineering (1979)
Analysis and Comparison of Fully Homomorphic Encryption Approaches Over Integers
Bozkurt, Cansu; Cenk, Murat; Betin Onur, Cansu; Department of Cryptography (2022-2-10)
The time period after the mid-20th century was named as information age or digital age. In that age, the world is being digitalized very fastly. The amount of data transferred and processed online is increasing rapidly. As a result, data protection became an essential topic for researchers. To process or make a computation on the encrypted data deciphering ciphertext first causes a security flaw. Homomorphic encryption (HE) algorithms were designed to make computations on data without deciphering it. Howeve...
Analysis of elastic limk mechanisms by finite elements.
Sakaoğlu, A. Nadi; Department of Mechanical Engineering (1985)
Analysis of three block cipher based hash functions : Whirpool, Grøstl and Grindahl
Ismailova, Rita; Diker Yücel, Melek; Department of Cryptography (2012)
The subject of this thesis is the study of cryptographic hash functions, which utilize block ciphers as underlying chain functions. It is mainly concerned with the analysis of the three hash algorithms, the Whirlpool, Grøstl and Grindahl. All these hash functions have underlying block ciphers that are modified versions of the Advance Encryption Standard and we investigate the behavior of these block ciphers under the integral attack. Statistical tests, such as the avalanche test and the collision test, are ...
Analysis of Block Recombination and Lazy Interpolation Methods and Their Applications to Saber
Aksoy, Berkin; Cenk, Murat (2022-01-01)
Since the beginning of the National Institute of Standards and Technology (NIST), The Post-Quantum Cryptog-raphy (PQC) Standardization Process, efficient implementations of lattice-based algorithms have been studied extensively. Lattice-based NIST PQC finalists use polynomial or matrix-vector multiplications on the ring with type Zq [x]/f(x). For convenient ring types, Number Theoretic Transform (NTT) can be used to perform multiplications as done in Crystals-KYBER among the finalists of the NIST PQC Standa...
Citation Formats
Ö. İnce, “Analysis and linear cryptanalysis of the RC5 block cipher .,” Middle East Technical University, 2002.