![Cryptography / Block cipher modes of operation / Message authentication codes / Galois/Counter Mode / Cipher / Cryptographic hash functions / Block cipher / Stream cipher Cryptography / Block cipher modes of operation / Message authentication codes / Galois/Counter Mode / Cipher / Cryptographic hash functions / Block cipher / Stream cipher](https://www.pdfsearch.io/img/4030a09543e6a46336f98d9177af64d7.jpg) Date: 2018-06-14 07:12:37Cryptography Block cipher modes of operation Message authentication codes Galois/Counter Mode Cipher Cryptographic hash functions Block cipher Stream cipher | | Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6Add to Reading ListSource URL: who.rocq.inria.frDownload Document from Source Website File Size: 553,55 KBShare Document on Facebook
|