Cryptanalysis of C2
From MaRDI portal
Recommendations
Cited in
(19)- Cryptanalysis of SBLH
- Cryptanalysis of PRESENT-like ciphers with secret S-boxes
- Slender-set differential cryptanalysis
- Cryptanalysis of MD2
- Cryptanalysis of the CFVZ cryptosystem
- Cryptanalysis of CTC2
- Cryptanalysis of MDC-2
- SIGABA: Cryptanalysis of the Full Keyspace
- Dial C for Cipher
- Fast Software Encryption
- Cryptanalysis of Achterbahn-Version 2
- Toward reverse engineering on secret \(S\)-boxes in block ciphers
- CS-Cipher
- scientific article; zbMATH DE number 3854959 (Why is no real title available?)
- Differential cryptanalysis of PRESENT-like cipher
- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
- Counter-Cryptanalysis
- scientific article; zbMATH DE number 1418245 (Why is no real title available?)
- Cryptanalysis of ISO/IEC 9796-1
This page was built for publication: Cryptanalysis of C2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3183568)