<--- Back to Details
First PageDocument Content
Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack
Date: 2014-03-02 23:18:30
Differential cryptanalysis
Block cipher
Impossible differential cryptanalysis
E0
Cryptanalysis
Known-plaintext attack
Chosen-plaintext attack
Advanced Encryption Standard
Ciphertext
Cryptography
Espionage
Boomerang attack

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Download Document from Source Website

File Size: 198,25 KB

Share Document on Facebook

Similar Documents

r  Secret Code Machines: The Inside Story The Eerie World of Espionage Ho,s Created Some Truly Strange Hsrdwsre!

r Secret Code Machines: The Inside Story The Eerie World of Espionage Ho,s Created Some Truly Strange Hsrdwsre!

DocID: 1xTmM - View Document

“Surveillance art” reassures us: It is better to be a little paranoid Like the creators of the “Conversnitch” project, the artists of “surveillance art”1 invite us to drive out the finks and other espionage t

“Surveillance art” reassures us: It is better to be a little paranoid Like the creators of the “Conversnitch” project, the artists of “surveillance art”1 invite us to drive out the finks and other espionage t

DocID: 1vfwl - View Document

Susanne Knickmeier & Elisa Wallwaey  Statistical Overview and First Findings of a Case Analysis of Industrial Espionage in Germany

Susanne Knickmeier & Elisa Wallwaey Statistical Overview and First Findings of a Case Analysis of Industrial Espionage in Germany

DocID: 1v3WJ - View Document

Elisa Wallwaey  Economic and Industrial Espionage in German SMEs  Overview

Elisa Wallwaey Economic and Industrial Espionage in German SMEs Overview

DocID: 1uYr5 - View Document

An  Exceptional Espionage Operation Tolkachev, A Worthy Successor a

An Exceptional Espionage Operation Tolkachev, A Worthy Successor a

DocID: 1uWy5 - View Document