Back to Results
First PageMeta Content
Differential cryptanalysis / Boomerang attack / Substitution-permutation network / ICE / Q / Brute-force attack / Serpent / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers


Open Document

File Size: 140,03 KB

Share Result on Facebook

Company

the AES / /

Event

Force Majeure / /

IndustryTerm

exhaustive search / exhaustive key search / round substitution-permutation networks / /

Organization

Katholieke Universiteit Leuven / Flemish Government / European Commission / /

Person

Alex Biryukov Katholieke Universiteit Leuven / /

Position

author / /

ProvinceOrState

GOA / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption / http / /

URL

http /

SocialTag