<--- Back to Details
First PageDocument Content
Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis
Date: 2011-03-09 03:41:21
Differential-linear attack
Boomerang attack
Truncated differential cryptanalysis
Cryptanalysis
ICE
Key schedule
Impossible differential cryptanalysis
XSL attack
Data Encryption Standard
Cryptography
Differential cryptanalysis
Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.co.jp

Download Document from Source Website

File Size: 427,64 KB

Share Document on Facebook

Similar Documents

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

DocID: 1kArO - View Document

Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation C´eline Blondeau1 , Aslı Bay, and Serge Vaudenay2 1

Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation C´eline Blondeau1 , Aslı Bay, and Serge Vaudenay2 1

DocID: 1gJOd - View Document

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

DocID: 17YPu - View Document

PDF Document

DocID: 17pVP - View Document

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

DocID: 12DTu - View Document