<--- Back to Details
First PageDocument Content
Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis
Date: 2011-03-18 00:53:23
Differential-linear attack
Boomerang attack
Truncated differential cryptanalysis
Cryptanalysis
ICE
Key schedule
Impossible differential cryptanalysis
XSL attack
Data Encryption Standard
Cryptography
Differential cryptanalysis
Linear cryptanalysis

Add to Reading List

Source URL: www.sony.net

Download Document from Source Website

File Size: 427,64 KB

Share Document on Facebook

Similar Documents

Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

PDF Document

DocID: 1jbLs - View Document