<--- Back to Details
First PageDocument Content
Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage
Date: 2014-03-02 23:18:30
Linear cryptanalysis
Weak key
Chosen-plaintext attack
Cryptanalysis
Ciphertext
Advanced Encryption Standard
FROG
Differential-linear attack
Running key cipher
Cryptography
Differential cryptanalysis
Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Download Document from Source Website

File Size: 193,47 KB

Share Document on Facebook

Similar Documents

Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document