First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-20 08:23:24Eli Biham NESSIE Symmetric-key algorithm Serpent Cryptographic hash function Boomerang attack Advanced Encryption Standard Cryptanalysis KASUMI Cryptography Block ciphers SHACAL | Add to Reading List |