The higher-order meet-in-the-middle attack and its...

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher

Lu, Jiqiang, Wei, Yongzhuang, Kim, Jongsung, Pasalic, Enes
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
527
Language:
english
Journal:
Theoretical Computer Science
DOI:
10.1016/j.tcs.2014.01.031
Date:
March, 2014
File:
PDF, 552 KB
english, 2014
Conversion to is in progress
Conversion to is failed