<--- Back to Details
First PageDocument Content
Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions
Date: 2013-02-07 00:29:28
Man-in-the-middle attack
Key size
Brute-force attack
VEST
Block cipher
Cipher
Advanced Encryption Standard
Meet-in-the-middle attack
Key schedule
Cryptography
Stream ciphers
Cryptographic hash functions

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 322,89 KB

Share Document on Facebook

Similar Documents

Lattice-based cryptography / Post-quantum cryptography / NTRU / NTRUEncrypt

Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

DocID: 1pn68 - View Document

A Meet-in-the-Middle Attack on 8-Round AES H¨ useyin Demirci1 and Ali Aydın Sel¸cuk2 1 T¨

DocID: 1jKW0 - View Document

Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

DocID: 18ACY - View Document

Ciphertext / Triple DES / Advanced Encryption Standard / Cipher / Stream cipher / RC4 / Meet-in-the-middle attack / Block size / ICE / Cryptography / Data Encryption Standard / Block cipher

Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm

DocID: 18oMb - View Document

University of Cambridge Computer Laboratory / Key schedule / Linear cryptanalysis / Block cipher / Grain / ICE / Advanced Encryption Standard / Cipher / Churning / Cryptography / Stream ciphers / Tiny Encryption Algorithm

A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u

DocID: 9bgN - View Document