On the weak keys of blowfish
From MaRDI portal
Publication:4593779
DOI10.1007/3-540-60865-6_39zbMath1373.94932DBLPconf/fse/Vaudenay96OpenAlexW1495580669WikidataQ21898105 ScholiaQ21898105MaRDI QIDQ4593779
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_39
Related Items (6)
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES ⋮ All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach ⋮ Slender-set differential cryptanalysis ⋮ Differential cryptanalysis of PRESENT-like cipher ⋮ Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations ⋮ Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
This page was built for publication: On the weak keys of blowfish