<--- Back to Details
First PageDocument Content
Idea NXT / Key schedule / Advanced Encryption Standard / International Data Encryption Algorithm / Linear feedback shift register / XSL attack / Cryptography / Block ciphers / Differential cryptanalysis
Date: 2009-11-18 09:27:18
Idea NXT
Key schedule
Advanced Encryption Standard
International Data Encryption Algorithm
Linear feedback shift register
XSL attack
Cryptography
Block ciphers
Differential cryptanalysis

Add to Reading List

Source URL: lasecwww.epfl.ch

Download Document from Source Website

File Size: 214,74 KB

Share Document on Facebook

Similar Documents

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

DocID: 17YPu - View Document

Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

PDF Document

DocID: 17pVP - View Document

Block cipher / Q / Finite fields / XSL attack / Encryption by date / Cryptography / Advanced Encryption Standard / Polynomial

White Box Cryptography: Another Attempt? Julien Bringer1 , Herv´e Chabanne1 , and Emmanuelle Dottax?? 1 Sagem D´efense S´ecurit´e

DocID: 13dD9 - View Document

Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

DocID: 12Xsc - View Document

Algebraic geometry / QUAD / Polynomials / Hidden Field Equations / XTR / System of polynomial equations / Quadratic / NP / XSL attack / Mathematics / Finite fields / Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

DocID: 11hbv - View Document