Back to Results
First PageMeta Content
Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory


Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc
Add to Reading List

Document Date: 2015-04-22 23:59:39


Open Document

File Size: 415,76 KB

Share Result on Facebook

Company

the AES / /

Currency

pence / /

/

Event

Force Majeure / /

Facility

Nanyang Technological University / /

IndustryTerm

brute force key search / described distinguishing algorithm / online phase / boomerang algorithm / online phases / exhaustive search / /

Organization

Nanyang Technological University in Singapore / School of Physical and Mathematical Sciences / Ecole Normale Sup´erieure / Nanyang Technological University / Singapore / France Division of Mathematical Sciences / /

Person

All / Prince / Ai / Ivica Nikoli / /

Position

PRINCE / first author / PRINCE Data Time / /

Product

Audiovox RC10 Radio / /

Technology

encryption / cryptography / boomerang algorithm / Aligning encryption / block cipher / secret key / previously described distinguishing algorithm / /

SocialTag