<--- Back to Details
First PageDocument Content
Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis
Date: 2011-12-22 00:23:21
Cryptanalysis
Integral cryptanalysis
ICE
Camellia
Truncated differential cryptanalysis
Chosen-plaintext attack
Advanced Encryption Standard
Key schedule
Block cipher
Cryptography
Differential cryptanalysis
Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 337,89 KB

Share Document on Facebook

Similar Documents

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

DocID: 1kArO - View Document

Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation C´eline Blondeau1 , Aslı Bay, and Serge Vaudenay2 1

DocID: 1gJOd - View Document

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

DocID: 17YPu - View Document

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

PDF Document

DocID: 17pVP - View Document

Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

DocID: 12DTu - View Document