Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks

Encryption algorithms that use the same secret key for encryption and decryption (also known as block ciphers) allow confidential information to be protected and accessible only by legitimate parties who have knowledge of that secret key. Before the public can be comfortable with using a block ciphe...

Full description

Saved in:
Bibliographic Details
Main Author: Chung Raphael, Wei Phan
Format: Article
Published: Elsevier Science Publishers B. V. 2007
Subjects:
Online Access:http://eprints.utm.my/id/eprint/17118/
http://dx.doi.org/10.1016/j.csi.2006.08.001
Tags: Add Tag
No Tags, Be the first to tag this record!