Boomerang attack

Results: 40



#Item
31Data Encryption Standard / International Data Encryption Algorithm / Khufu and Khafre / Key schedule / Boomerang attack / Block cipher / Cryptanalysis / ICE / Ciphertext / Cryptography / Differential cryptanalysis / Weak key

1 New Weak-Key Classes of IDEA

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
32Differential cryptanalysis / Boomerang attack / ICE / Khufu and Khafre / Key schedule / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

Related-key Cryptanalysis of the Full AES-192 and AES-256 Alex Biryukov and Dmitry Khovratovich

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2009-07-25 16:36:14
33Differential cryptanalysis / Boomerang attack / Substitution-permutation network / ICE / Q / Brute-force attack / Serpent / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
34ICE / Boomerang attack / Cipher / Cryptanalysis / Differential cryptanalysis / Khufu and Khafre / Cryptography / Block cipher / Ciphertext

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 03:26:03
35SHA-2 / One-way compression function / Differential cryptanalysis / MD5 / SHACAL / Hash function / Preimage attack / Collision attack / Boomerang attack / Cryptography / Cryptographic hash functions / SHA-1

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-20 11:25:59
36Key management / Differential cryptanalysis / Key schedule / Boomerang attack / Weak key / Related-key attack / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 21:59:51
37RC5 / MISTY1 / Key schedule / Integral cryptanalysis / RC6 / Impossible differential cryptanalysis / Ciphertext / Boomerang attack / Differential cryptanalysis / Cryptography / Block ciphers / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 10:58:11
38Mathematics / Collision / Differential of a function / Boomerang attack / Cryptographic hash functions / Physics / SHA-1

PDF Document

Add to Reading List

Source URL: eurocrypt2009rump.cr.yp.to

Language: English - Date: 2009-04-29 03:56:52
39MISTY1 / Boomerang attack / Key schedule / ICE / Feistel cipher / Differential cryptanalysis / E0 / A5/1 / Cryptography / Stream ciphers / KASUMI

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
40ISO 216 / Boomerang attack / Science / Vehicle Identification Number / A / Cryptanalysis

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-25 21:13:29
UPDATE