<--- Back to Details
First PageDocument Content
MISTY1 / Boomerang attack / Key schedule / ICE / Feistel cipher / Differential cryptanalysis / E0 / A5/1 / Cryptography / Stream ciphers / KASUMI
Date: 2010-01-10 13:51:33
MISTY1
Boomerang attack
Key schedule
ICE
Feistel cipher
Differential cryptanalysis
E0
A5/1
Cryptography
Stream ciphers
KASUMI

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 242,53 KB

Share Document on Facebook

Similar Documents

Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

DocID: 1jyFw - View Document

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

DocID: 18ACY - View Document

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

DocID: 17YPu - View Document

PDF Document

DocID: 17pVP - View Document

improved_analysis_of_Shamata-BC.dvi

improved_analysis_of_Shamata-BC.dvi

DocID: 13sov - View Document