Amanote Research

Amanote Research

    RegisterSign In

Known-Iv Attacks on Triple Modes of Operation of Block Ciphers

Lecture Notes in Computer Science - Germany
doi 10.1007/3-540-45682-1_13
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2001

Authors
Deukjo HongJaechul SungSeokhie HongWonil LeeSangjin LeeJongin LimOkyeon Yi
Publisher

Springer Berlin Heidelberg


Related search

New Combined Attacks on Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Modes of Operation of Stream Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

Recommendation for Block Cipher Modes of Operation

2019English

Counter-In-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Linearisation Attacks on FCSR-based Stream Ciphers

International Journal for Information Security Research
2012English

The Interpolation Attack on Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1997English

Algebraic Cryptanalysis of Block Ciphers

2019English

Stream Ciphers: A Comparative Study of Attacks and Structures

International Journal of Computer Applications
2013English

On Key Schedule for Block Ciphers Without Week Keys

Prikladnaya diskretnaya matematika. Prilozhenie
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy