First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-20 08:23:24Eli Biham NESSIE Symmetric-key algorithm Serpent Cryptographic hash function Boomerang attack Advanced Encryption Standard Cryptanalysis KASUMI Cryptography Block ciphers SHACAL | Add to Reading List |
![]() | Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, SDocID: 1jyFw - View Document |
![]() | Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical ScDocID: 18ACY - View Document |
![]() | The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document |
![]() | PDF DocumentDocID: 17pVP - View Document |
![]() | improved_analysis_of_Shamata-BC.dviDocID: 13sov - View Document |