Back to Results
First PageMeta Content
Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE


Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli“c2 1 University of Luxembourg Nanyang Technological University, Singapore
Add to Reading List

Document Date: 2015-05-05 12:02:44


Open Document

File Size: 354,46 KB

Share Result on Facebook
UPDATE