The higher-order meet-in-the-middle attack and its application to the Camellia block cipher

From MaRDI portal
Publication:2437779






Cites work



Describes a project that uses

Uses Software





This page was built for publication: The higher-order meet-in-the-middle attack and its application to the Camellia block cipher

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2437779)