Interpolation attack
Results: 3
# | Item |
---|---|
1![]() | PDF DocumentAdd to Reading ListSource URL: jda.noekeon.orgLanguage: English - Date: 2013-08-28 07:53:28 |
2![]() | Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KUAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-05-04 10:17:39 |
3![]() | 3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASUAdd to Reading ListSource URL: www.nict.go.jpLanguage: English - Date: 2005-09-28 07:39:19 |