<--- Back to Details
First PageDocument Content
Differential-linear attack / Initialization vector / Differential cryptanalysis / Linear cryptanalysis / Confusion and diffusion / Z4 / ICE / Normal distribution / Keystream / Cryptography / Stream ciphers / Phelix
Date: 2006-12-12 15:42:51
Differential-linear attack
Initialization vector
Differential cryptanalysis
Linear cryptanalysis
Confusion and diffusion
Z4
ICE
Normal distribution
Keystream
Cryptography
Stream ciphers
Phelix

Add to Reading List

Source URL: www.ecrypt.eu.org

Download Document from Source Website

File Size: 222,32 KB

Share Document on Facebook

Similar Documents

Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

PDF Document

DocID: 1jbLs - View Document