<--- Back to Details
First PageDocument Content
MISTY1 / Boomerang attack / Key schedule / ICE / Feistel cipher / Differential cryptanalysis / E0 / A5/1 / Cryptography / Stream ciphers / KASUMI
Date: 2010-01-10 13:51:33
MISTY1
Boomerang attack
Key schedule
ICE
Feistel cipher
Differential cryptanalysis
E0
A5/1
Cryptography
Stream ciphers
KASUMI

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 242,53 KB

Share Document on Facebook

Similar Documents

PDF Document

DocID: 1wnBf - View Document

1 Exclusive ρ0 electroproduction on transversely polarized protons The Hermes collaboration In exclusive ρ0 electroproduction e + p → e0 + ρ0 + p0 an incoming electron scatters from a proton by exchanging a virtual

DocID: 1vgkN - View Document

Untersuchung von E0-Übergängen in Kernen am Phasenübergang zwischen sphärischer und deformierter Kerngestalt Masterthesis

DocID: 1v7s1 - View Document

Investigation of E0 transitions in nuclei at the transitional point between spherical and deformed shapes * Andreas Krugmann  Motivation

DocID: 1v1Iv - View Document

Steroidlabor (Raum-Nr. E0.608) Univ.-Kinderklinik Gießen Prof. Dr. S. A. Wudy Feulgenstr. 12 DGießen Deutschland

DocID: 1uyno - View Document