A Unified Approach to Related-Key Attacks (Q3525662): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
ReferenceBot (talk | contribs) Changed an Item |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_5 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1587158155 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Improved DST Cryptanalysis of IDEA / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4434895 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New types of cryptanalytic attacks using related keys / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4941808 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2778856 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New Cryptanalytic Results on IDEA / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A New Attack on 6-Round IDEA / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3136298 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Improved Time-Memory Trade-Offs with Multiple Data / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4428360 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4941816 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3046335 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4314019 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4341750 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The block cipher Square / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4413860 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Selected Areas in Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4537993 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536653 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Cycle lengths in a permutation are typically Poisson / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4249632 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536255 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Selected Areas in Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4373634 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Information Security and Privacy / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4341684 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Markov Ciphers and Differential Cryptanalysis / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4934705 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4934706 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Information Security and Privacy / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fast Software Encryption / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4941810 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484891 / rank | |||
Normal rank |
Latest revision as of 16:25, 28 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | A Unified Approach to Related-Key Attacks |
scientific article |
Statements
A Unified Approach to Related-Key Attacks (English)
0 references
18 September 2008
0 references