Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Encryption algorithms that use the same secret key for encryption and decryption (also known as block ciphers) allow confidential information to be protected and accessible only by legitimate parties who have knowledge of that secret key. Before the public can be comfortable with using a block ciphe...
Saved in:
Main Author: | Chung Raphael, Wei Phan |
---|---|
Format: | Article |
Published: |
Elsevier Science Publishers B. V.
2007
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/17118/ http://dx.doi.org/10.1016/j.csi.2006.08.001 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Practical security against differential cryptanalysis of extended feistel network
by: Ibrahim, Subariah, et al.
Published: (2007) -
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006) -
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006) -
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006) -
Hybrid algorithm (GACSA) for the cryptanalysis of a simple substitution cipher
by: Maarof, Mohd. Aizaini, et al.
Published: (2007)