Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
Encryption algorithms that use the same secret key for encryption and decryption (also known as block ciphers) allow confidential information to be protected and accessible only by legitimate parties who have knowledge of that secret key. Before the public can be comfortable with using a block ciphe...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Published: |
Elsevier Science Publishers B. V.
2007
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/17118/ http://dx.doi.org/10.1016/j.csi.2006.08.001 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!