First Page | Document Content | |
---|---|---|
Date: 2011-12-30 14:28:01Key size Symmetric-key algorithm Block ciphers LEX Cryptanalysis Ciphertext Cipher XSL attack Serpent Cryptography Advanced Encryption Standard Brute-force attack | Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-KAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 179,71 KBShare Document on Facebook |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1xVFh - View Document | |
Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† AbstractDocID: 1uJpL - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1tQVA - View Document | |
Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ AbstractDocID: 1tqoX - View Document |