Back to Results
First PageMeta Content
Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE


Complementing Feistel Ciphers? Alex Biryukov1 and Ivica NikoliĀ“c2 1 University of Luxembourg Nanyang Technological University, Singapore
Add to Reading List

Document Date: 2015-05-05 12:02:44


Open Document

File Size: 354,46 KB

Share Result on Facebook

Currency

pence / /

/

Facility

University of Luxembourg Nanyang Technological University / /

IndustryTerm

exhaustive key search / /

OperatingSystem

L3 / /

Organization

Nanyang Technological University / Singapore / US Federal Reserve / /

Person

Ivica Nikoli / /

Technology

Encryption / /

SocialTag