scientific article
From MaRDI portal
Publication:3046339
zbMath1045.94528MaRDI QIDQ3046339
Publication date: 12 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650061.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (7)
Practical-time attacks against reduced variants of~MISTY1 ⋮ An Improved Impossible Differential Attack on MISTY1 ⋮ Improved Attacks on Reduced-Round Camellia-128/192/256 ⋮ Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 ⋮ Impossible Differential Cryptanalysis of 14-Round Camellia-192 ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ A $$2^{70}$$ Attack on the Full MISTY1
This page was built for publication: