Topics in Cryptology – CT-RSA 2006
From MaRDI portal
Publication:5898553
DOI10.1007/11605805zbMath1125.94320OpenAlexW2564556261WikidataQ56921257 ScholiaQ56921257MaRDI QIDQ5898553
Nathan Keller, Orr Dunkelman, Eli Biham
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11605805
Related Items (11)
Impossible differential cryptanalysis of advanced encryption standard ⋮ Improving the Biclique Cryptanalysis of AES ⋮ When messages are keys: is HMAC a dual-PRF? ⋮ A Meet-in-the-Middle Attack on 8-Round AES ⋮ Improved Impossible Differential Attacks on Large-Block Rijndael ⋮ New Results on Impossible Differential Cryptanalysis of Reduced AES ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ The (related-key) impossible boomerang attack and its application to the AES block cipher ⋮ Related-Key Differential-Linear Attacks on Reduced AES-192 ⋮ Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia ⋮ New Related-Key Boomerang Attacks on AES
This page was built for publication: Topics in Cryptology – CT-RSA 2006