<--- Back to Details
First PageDocument Content
Key management / Differential cryptanalysis / Key schedule / Boomerang attack / Weak key / Related-key attack / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers
Date: 2009-12-04 21:59:51
Key management
Differential cryptanalysis
Key schedule
Boomerang attack
Weak key
Related-key attack
ARIA
Q
Cryptography
Advanced Encryption Standard
Block ciphers

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 378,78 KB

Share Document on Facebook

Similar Documents

Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

DocID: 1pm6K - View Document

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version) Alex Biryukov, Dmitry Khovratovich, Ivica Nikoli“c University of Luxembourg {alex.biryukov, dmitry.khovratovich, }

DocID: 1okDI - View Document

RC4 / Keystream / ICE / Related-key attack / Cryptography / Stream ciphers / Py

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

DocID: 1asyo - View Document

RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

DocID: 182wg - View Document