<--- Back to Details
First PageDocument Content
Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL
Date: 2012-06-20 08:23:24
Eli Biham
NESSIE
Symmetric-key algorithm
Serpent
Cryptographic hash function
Boomerang attack
Advanced Encryption Standard
Cryptanalysis
KASUMI
Cryptography
Block ciphers
SHACAL

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 19,92 KB

Share Document on Facebook

Similar Documents

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

DocID: 1nWeC - View Document

A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:

DocID: 1mlxI - View Document

New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha

DocID: 1jvxK - View Document

In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il

DocID: 1jkiK - View Document

The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008

DocID: 1b89t - View Document