<--- Back to Details
First PageDocument Content
MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI
Date: 2005-09-28 07:39:19
MISTY1
Cryptanalysis
Block cipher
Linear cryptanalysis
Interpolation attack
Ciphertext
Chosen-plaintext attack
ICE
Data Encryption Standard
Cryptography
Differential cryptanalysis
KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Download Document from Source Website

File Size: 239,33 KB

Share Document on Facebook

Similar Documents

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document