Fast Software Encryption
From MaRDI portal
Publication:5713913
DOI10.1007/b98177zbMath1079.68548OpenAlexW2485295499MaRDI QIDQ5713913
Won Il Lee, Sang Jin Lee, Ju-Sung Kang, Youngdai Ko, Seokhie Hong
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98177
Related Items (17)
Efficient slide attacks ⋮ Complementing Feistel Ciphers ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ A single-key attack on the full GOST block cipher ⋮ A (Second) Preimage Attack on the GOST Hash Function ⋮ A compress slide attack on the full GOST block cipher ⋮ AKF: a key alternating Feistel scheme for lightweight cipher designs ⋮ Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE ⋮ A Single-Key Attack on the Full GOST Block Cipher ⋮ Notions and relations for RKA-secure permutation and function families ⋮ Cryptanalysis of the GOST Hash Function ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Reflection Cryptanalysis of Some Ciphers
Uses Software
This page was built for publication: Fast Software Encryption