Rebound attack

Results: 7



#Item
1Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
2Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
3Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1  Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-19 04:50:18
    4Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1 María Naya-Plasencia2 1 École

    Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1 María Naya-Plasencia2 1 École

    Add to Reading List

    Source URL: fse2012.inria.fr

    Language: English - Date: 2012-03-28 03:18:43
      5Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

      Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:32
      6rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

      rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-09-10 21:29:48