A Unified Approach to Related-Key Attacks (Q3525662): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1587158155 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved DST Cryptanalysis of IDEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434895 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New types of cryptanalytic attacks using related keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941808 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Boomerang and Rectangle Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Cryptanalytic Results on IDEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Attack on 6-Round IDEA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3136298 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Time-Memory Trade-Offs with Multiple Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4428360 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3046335 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4314019 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341750 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The block cipher Square / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413860 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4537993 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536653 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cycle lengths in a permutation are typically Poisson / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249632 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536255 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selected Areas in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4373634 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Markov Ciphers and Differential Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934705 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934706 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941810 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484891 / rank
 
Normal rank

Latest revision as of 16:25, 28 June 2024

scientific article
Language Label Description Also known as
English
A Unified Approach to Related-Key Attacks
scientific article

    Statements

    A Unified Approach to Related-Key Attacks (English)
    0 references
    0 references
    0 references
    0 references
    18 September 2008
    0 references

    Identifiers