First Page | Document Content | |
---|---|---|
Date: 2011-03-18 00:53:23Differential-linear attack Boomerang attack Truncated differential cryptanalysis Cryptanalysis ICE Key schedule Impossible differential cryptanalysis XSL attack Data Encryption Standard Cryptography Differential cryptanalysis Linear cryptanalysis | Add to Reading ListSource URL: www.sony.netDownload Document from Source WebsiteFile Size: 427,64 KBShare Document on Facebook |
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa NyDocID: 1kArO - View Document | |
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation C´eline Blondeau1 , Aslı Bay, and Serge Vaudenay2 1DocID: 1gJOd - View Document | |
The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document | |
PDF DocumentDocID: 17pVP - View Document | |
ImprovedIDCofCamellia-192-256_v_8_13_springer.dviDocID: 12DTu - View Document |