On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model

From MaRDI portal
Revision as of 22:35, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3013081


DOI10.1007/978-3-642-21702-9_8zbMath1282.94030MaRDI QIDQ3013081

Kenneth G. Paterson, Gaven J. Watson, Pooya Farshim, Martin R. Albrecht

Publication date: 7 July 2011

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-21702-9_8


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items



Cites Work