Back to Results
First PageMeta Content
Cryptanalysis / Cryptographic hash function / Ciphertext / Linear cryptanalysis / FEAL / Advanced Encryption Standard / Cube attack / Cipher / Stream cipher / Cryptography / Symmetric-key algorithm / Block cipher


ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II
Add to Reading List

Open Document

File Size: 447,85 KB

Share Result on Facebook

Company

Initialization-Phase Attacks 15 4 Trade / AES / Knudsen / /

Event

Bankruptcy / /

Facility

University of Luxemburg / /

IndustryTerm

statistical cryptanalysis tools / symmetric cryptographic algorithms / symmetric encryption algorithms / property-testing algorithms / /

Organization

Commission of the European Communities / University of Luxemburg / Katholieke Universiteit Leuven / European Commission / /

Person

Martin Schl¨affer / Christian Rechberger / Svetla Nikova / Nicky Mouha / Vincent Rijmen / Jorge Nakahara Jr. / Willi Meier / Jonathan Etrog / Dmitry Khovratovich / /

Position

cryptanalysis Editor / Executive / years Lead contractor / symmetric key cryptanalysis Editor / /

Technology

encryption / cryptography / secret key / property-testing algorithms / 1 6.3 Matsui Algorithm / symmetric cryptographic algorithms / 6.2 Matsui Algorithm / symmetric encryption algorithms / /

SocialTag