First Page | Document Content | |
---|---|---|
Date: 2018-06-14 07:12:37Cryptography Block cipher modes of operation Message authentication codes Galois/Counter Mode Cipher Cryptographic hash functions Block cipher Stream cipher | Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6Add to Reading ListSource URL: who.rocq.inria.frDownload Document from Source WebsiteFile Size: 553,55 KBShare Document on Facebook |