Key-Schedule Cryptanalysis of DEAL
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Cryptanalysis of Reduced-Round MISTY
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
The Saturation Attack - A Bait for Twofish
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
On the Security of CAMELLIA against the Square Attack
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Luby---Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme
Designs, Codes and Cryptography
Generic Attacks on Feistel Networks with Internal Permutations
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Hi-index | 0.00 |