<--- Back to Details
First PageDocument Content
Block cipher / Boomerang attack / Stream cipher / ICE / Advanced Encryption Standard / Cipher / Cryptanalysis / Symmetric-key algorithm / Chosen-plaintext attack / Cryptography / Linear cryptanalysis / Differential cryptanalysis
Date: 2009-03-31 06:03:14
Block cipher
Boomerang attack
Stream cipher
ICE
Advanced Encryption Standard
Cipher
Cryptanalysis
Symmetric-key algorithm
Chosen-plaintext attack
Cryptography
Linear cryptanalysis
Differential cryptanalysis

Algebraic Techniques in Differential Cryptanalysis Martin Albrecht and Carlos Cid

Add to Reading List

Source URL: www.ei.rub.de

Download Document from Source Website

File Size: 213,82 KB

Share Document on Facebook

Similar Documents

Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

DocID: 1jyFw - View Document

Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

DocID: 18ACY - View Document

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

DocID: 17YPu - View Document

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

PDF Document

DocID: 17pVP - View Document

SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

DocID: 13sov - View Document