Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
12
references
Top references
cited by
20
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,203
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Cryptology
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
other
Author(s):
Nicky Mouha
,
Qingju Wang
,
Dawu Gu
,
Bart Preneel
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Smart Contracts Programming Languages
Most cited references
12
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
195
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
On correlation between the order of S-boxes and the strength of DES
Mitsuru Matsui
(1995)
0
comments
Cited
31
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
The Wide Trail Design Strategy
Joan Daemen
,
Vincent Rijmen
(2001)
0
comments
Cited
23
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2012
Pages
: 57-76
DOI:
10.1007/978-3-642-34704-7_5
SO-VID:
1e404829-0027-438e-8571-f70c7718d38b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 57
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Similar content
3,203
Collective Nature of the Reentrant Integer Quantum Hall States in the Second Landau Level
Authors:
N Deng
,
A. Kumar
,
M. J. Manfra
…
Asymptotic behavior of the Hurwitz-Lerch multiple zeta function at non-positive integer points
Authors:
Hideki Murahara
,
Tomokazu Onozuka
Bernstein–Schurer–Kantorovich operators based on q-integers
Authors:
P.N. Agrawal
,
Zoltán Finta
,
A. Sathish Kumar
See all similar
Cited by
20
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Authors:
Christof Beierle
,
Jérémy Jean
,
Stefan Kölbl
…
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
Authors:
Siwei Sun
,
Lei Hu
,
Peng Wang
…
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Authors:
Begul Bilgin
,
Andrey Bogdanov
,
Miroslav M. Knežević
…
See all cited by