Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
29
views
8
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,633
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
other
Author(s):
Youngdai Ko
,
Seokhie Hong
,
Wonil Lee
,
Sangjin Lee
,
Ju-Sung Kang
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ChemSpider related publications
Most cited references
8
Record
: found
Abstract
: not found
Book
: not found
Differential Cryptanalysis of the Data Encryption Standard
Eli Biham
,
Adi Shamir
(1993)
0
comments
Cited
43
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
John H. Kelsey
,
Bruce Schneier
,
David D. Wagner
(1996)
0
comments
Cited
39
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA
John E Kelsey
,
Bruce Schneier
,
David G. Wagner
(1997)
0
comments
Cited
27
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 299-316
DOI:
10.1007/978-3-540-25937-4_19
SO-VID:
37a895e7-0d1b-441e-862e-86a926e4f754
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Cryptographic Primitives Based on Multiword T-Functions
pp. 226
A New Stream Cipher HC-256
pp. 245
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
pp. 260
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
pp. 49
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
pp. 65
Improving Fast Algebraic Attacks
pp. 279
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
pp. 299
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
pp. 332
Two Power Analysis Attacks against One-Mask Methods
pp. 348
Nonce-Based Symmetric Encryption
pp. 359
Ciphers Secure against Related-Key Attacks
pp. 389
The EAX Mode of Operation
pp. 408
CWC: A High-Performance Conventional Authenticated Encryption Mode
Similar content
4,633
Gosteli−Claisen Rearrangement: DFT Study of Substituent−Rate Effects
Authors:
Julia Rehbein
,
Martin Hiersemann
GOST 54650-2011 Soils. Determination of Mobile Phosphorus and Potassium Compounds by Kirsanov Method Modified by CINAO
Authors:
Gost-effectiveness of improving primary care treatment of late-life depression
Authors:
WJ Katon
,
M. SCHOENBAUM
,
MY Fan
…
See all similar
Cited by
14
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
Authors:
Mihir Bellare
,
David Cash
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
Authors:
Seokhie Hong
,
Jongsung Kim
,
Sangjin Lee
…
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
Authors:
Jongsung Kim
,
Seokhie Hong
,
Bart Preneel
See all cited by