<--- Back to Details
First PageDocument Content
Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis
Date: 2011-12-13 18:32:02
Advanced Encryption Standard
Key schedule
Linear cryptanalysis
GOST
Differential-linear attack
Cipher
ICE
Serpent
Cryptanalysis
Cryptography
Block ciphers
Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: www.cba.mit.edu

Download Document from Source Website

File Size: 264,78 KB

Share Document on Facebook

Similar Documents

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

PDF Document

DocID: 1jbLs - View Document