Interpolation attack

Results: 3



#Item
1

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:28
2Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
33-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19