<--- Back to Details
First PageDocument Content
Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis
Date: 2011-03-18 00:53:23
Differential-linear attack
Boomerang attack
Truncated differential cryptanalysis
Cryptanalysis
ICE
Key schedule
Impossible differential cryptanalysis
XSL attack
Data Encryption Standard
Cryptography
Differential cryptanalysis
Linear cryptanalysis

Add to Reading List

Source URL: www.sony.net

Download Document from Source Website

File Size: 427,64 KB

Share Document on Facebook

Similar Documents

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1qyZS - View Document

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

DocID: 1pVwy - View Document

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

DocID: 1jtxb - View Document

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities ´ Celine Blondeau and Kaisa Nyberg

DocID: 1jg52 - View Document

PDF Document

DocID: 1jbLs - View Document