![Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher](https://www.pdfsearch.io/img/e1ed44b57d7fdbc1ec2c48b200354d27.jpg)
| Document Date: 2005-09-28 07:38:35 Open Document File Size: 173,24 KBShare Result on Facebook
Company AES / UCL Crypto Group / Knudsen / Reconfigurable Hardware / Toshiba / / Currency pence / / Facility National Institute of Information / / IndustryTerm cryptographic algorithm / exhaustive search / basic algorithm / brute force search / / Organization Tokyo university / National Institute of Information / / Position Researcher / Professor / / ProgrammingLanguage FL / / Technology Encryption / block cipher / simulation / cryptographic algorithm / basic algorithm / / URL http /
SocialTag |