<--- Back to Details
First PageDocument Content
Linear cryptanalysis / Weak key / Chosen-plaintext attack / Cryptanalysis / Ciphertext / Advanced Encryption Standard / FROG / Differential-linear attack / Running key cipher / Cryptography / Differential cryptanalysis / Advantage
Date: 2014-03-02 23:18:30
Linear cryptanalysis
Weak key
Chosen-plaintext attack
Cryptanalysis
Ciphertext
Advanced Encryption Standard
FROG
Differential-linear attack
Running key cipher
Cryptography
Differential cryptanalysis
Advantage

Cryptanalysis of FROG David Wagner∗ Niels Ferguson† Bruce Schneier‡

Add to Reading List

Source URL: www.schneier.com

Download Document from Source Website

File Size: 193,47 KB

Share Document on Facebook

Similar Documents

Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

Cryptography / Block ciphers / GOST standards / Differential cryptanalysis / Linear cryptanalysis / Interpolation attack / International Data Encryption Algorithm / Data Encryption Standard / GOST / Key schedule / PRESENT / Advanced Encryption Standard

PDF Document

DocID: 1jbLs - View Document