29
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Fast Software Encryption 

      Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references8

          • Record: found
          • Abstract: not found
          • Book: not found

          Differential Cryptanalysis of the Data Encryption Standard

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA

                Bookmark

                Author and book information

                Book Chapter
                2004
                : 299-316
                10.1007/978-3-540-25937-4_19
                37a895e7-0d1b-441e-862e-86a926e4f754
                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,633

                Cited by14