Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
14
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,425
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
other
Author(s):
Serge Vaudenay
Publication date
(Online):
June 2 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
DrugRxiv
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Complete mappings of finite groups
Lowell J. Paige
,
Marshall Hall
(1955)
0
comments
Cited
15
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Properties of linear approximation tables
Luke O'Connor
(1995)
0
comments
Cited
8
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Latin squares and their applications
J. DENES
,
J Dénes
,
Dénes J.
…
(1974)
0
comments
Cited
7
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1995
Publication date (Online):
June 2 2005
Pages
: 286-297
DOI:
10.1007/3-540-60590-8_22
SO-VID:
5172f86f-221f-49bb-8723-fe29c2d4f677
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 242
Improved characteristics for differential cryptanalysis of hash functions based on block ciphers
pp. 29
Binary cyclotomic generators
pp. 61
Construction of bent functions and balanced Boolean functions with high nonlinearity
pp. 131
Properties of linear approximation tables
pp. 249
Linear cryptanalysis using multiple approximations and FEAL
pp. 275
Correlation matrices
pp. 286
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
pp. 363
TEA, a tiny encryption algorithm
Similar content
1,425
Words Restricted by 3-Letter Generalized Multipermutation Patterns
Authors:
Alexander Burstein
,
Toufik Mansour
Multipermutation Ulam Sphere Analysis Toward Characterizing Maximal Code Size
Authors:
Justin Kong
,
Manabu Hagiwara
MD4 STOCHASTIC ANALYSIS OF AN RANDOMIZED CONTROLLED TRIAL IN REHABILITATION OF LOW BACK PATIENTS: REPRESENTATION OF UNCERTAINTY WHEN EFFECT DIFFERENCE IS SMALL
Authors:
B Schweikert
,
E. Jacobi
,
J. Knab
…
See all similar
Cited by
11
RIPEMD-160: A strengthened version of RIPEMD
Authors:
Hans Dobbertin
,
Antoon Bosselaers
,
Bart Preneel
A New Class of Collision Attacks and Its Application to DES
Authors:
Kai Schramm
,
Thomas Wollinger
,
Christof Paar
Near-Collisions of SHA-0
Authors:
Eli Biham
,
Rafi Chen
See all cited by