Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714145
DOI10.1007/b96249zbMath1092.94507OpenAlexW2493429532MaRDI QIDQ5714145
Youngdai Ko, Won Il Lee, Seokhie Hong, Sang Jin Lee, Deukjo Hong, Donghoon Chang
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
Related Items (3)
Zero-correlation attacks: statistical models independent of the number of approximations ⋮ Meet-in-the-Middle Attacks on Reduced-Round XTEA ⋮ The Differential Analysis of S-Functions
Uses Software
This page was built for publication: Information Security and Cryptology - ICISC 2003