First Page | Document Content | |
---|---|---|
![]() Date: 2011-03-18 00:53:23Differential-linear attack Boomerang attack Truncated differential cryptanalysis Cryptanalysis ICE Key schedule Impossible differential cryptanalysis XSL attack Data Encryption Standard Cryptography Differential cryptanalysis Linear cryptanalysis | Source URL: www.sony.netDownload Document from Source WebsiteFile Size: 427,64 KBShare Document on Facebook |
![]() | Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaDocID: 1qyZS - View Document |
![]() | Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, AustriaDocID: 1pVwy - View Document |
![]() | The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007DocID: 17YPu - View Document |
![]() | PDF DocumentDocID: 17pVP - View Document |
![]() | Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999DocID: 13xrf - View Document |