First Page | Document Content | |
---|---|---|
![]() Differential cryptanalysis Boomerang attack Substitution-permutation network ICE Q Brute-force attack Serpent Data Encryption Standard Cryptography Advanced Encryption Standard Block ciphers | Source URL: www.cosic.esat.kuleuven.beDownload Document from Source WebsiteFile Size: 140,03 KBShare Document on Facebook |
![]() | Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, SDocID: 1jyFw - View Document |
![]() | Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical ScDocID: 18ACY - View Document |
![]() | The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document |
![]() | PDF DocumentDocID: 17pVP - View Document |
![]() | improved_analysis_of_Shamata-BC.dviDocID: 13sov - View Document |