1![Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal](https://www.pdfsearch.io/img/d81a714839aabf46f28e9aa2285bfdba.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-02-22 01:46:08
|
---|
2![A Meet-in-the-Middle Attack on 8-Round AES H¨ useyin Demirci1 and Ali Aydın Sel¸cuk2 1 T¨ A Meet-in-the-Middle Attack on 8-Round AES H¨ useyin Demirci1 and Ali Aydın Sel¸cuk2 1 T¨](https://www.pdfsearch.io/img/7512be97dbd85e00a74a4b3c90cf8ddd.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2010-07-23 02:28:36
|
---|
3![Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc](https://www.pdfsearch.io/img/166a4f4c9eec1a3624b3e61238a7f666.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-22 23:59:39
|
---|
4![Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm Lecture 9: Using Block and Stream Ciphers for Secure Wired and WiFi Communications Lecture Notes on “Computer and Network Security” by Avi Kak () March 8, 2015 4:01pm](https://www.pdfsearch.io/img/b8068ac046ad37768153b56acfd0f670.jpg) | Add to Reading ListSource URL: engineering.purdue.eduLanguage: English - Date: 2015-03-08 16:07:20
|
---|
5![A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Andrey Bogdanov and Christian Rechberger Katholieke Universiteit Leuven, ESAT/COSIC and IBBT, Belgium [removed]u](https://www.pdfsearch.io/img/389ffacc434fde154b2ce0b5190e2a64.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-02-14 05:03:01
|
---|
6![Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆ , Nicky Mouha⋆ ⋆ ⋆ , Vesselin Velichkov† , and Bart Preneel](https://www.pdfsearch.io/img/6e974b4e3a8e6ee59e132ce65010b8ca.jpg) | Add to Reading ListSource URL: www.cosic.esat.kuleuven.beLanguage: English |
---|
7![](https://www.pdfsearch.io/img/e09dfeea92dee7585bc627b0e460eb53.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-04-20 06:17:58
|
---|
8![](https://www.pdfsearch.io/img/c0d40971260bd79eb82b8bbfb29b3dcc.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-02-07 00:29:28
|
---|
9![](https://www.pdfsearch.io/img/c9c56a5da22a158a631e99e6e9f79432.jpg) | Add to Reading ListSource URL: stephanemoore.comLanguage: English - Date: 2012-12-15 17:40:40
|
---|