First Page | Document Content | |
---|---|---|
Date: 2011-03-18 00:53:23Differential-linear attack Boomerang attack Truncated differential cryptanalysis Cryptanalysis ICE Key schedule Impossible differential cryptanalysis XSL attack Data Encryption Standard Cryptography Differential cryptanalysis Linear cryptanalysis | Add to Reading ListSource URL: www.sony.netDownload Document from Source WebsiteFile Size: 427,64 KBShare Document on Facebook |
Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaDocID: 1qyZS - View Document | |
Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaDocID: 1pVwy - View Document | |
The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document | |
PDF DocumentDocID: 17pVP - View Document | |
Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999DocID: 13xrf - View Document |