First Page | Document Content | |
---|---|---|
Date: 2011-03-18 00:53:23Differential-linear attack Boomerang attack Truncated differential cryptanalysis Cryptanalysis ICE Key schedule Impossible differential cryptanalysis XSL attack Data Encryption Standard Cryptography Differential cryptanalysis Linear cryptanalysis | Add to Reading ListSource URL: www.sony.netDownload Document from Source WebsiteFile Size: 427,64 KBShare Document on Facebook |