×

Found 6 Documents (Results 1–6)

Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis. (English) Zbl 1312.94074

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 389-404 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. (English) Zbl 1295.94110

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 244-264 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle attack on reduced versions of the Camellia block cipher. (English) Zbl 1279.94097

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 197-215 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits. (English) Zbl 1292.94151

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 222-232 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

Software