메뉴 건너뛰기




Volumn 2355, Issue , 2002, Pages 1-15

The saturation attack – a bait for twofish

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 77649205039     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45473-X_1     Document Type: Conference Paper
Times cited : (74)

References (18)
  • 1
    • 84957694360 scopus 로고    scopus 로고
    • Miss in the Middle Attacks on IDEA and Khufru
    • Springer LNCS 1636
    • E. Biham, A. Biryukov, A. Shamir, “Miss in the Middle Attacks on IDEA and Khufru”, Fast Software Encryption 1999, Springer LNCS 1636, pp. 124–138.
    • Fast Software Encryption 1999 , pp. 124-138
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 2
    • 84947913669 scopus 로고    scopus 로고
    • Cryptanalysis of Ladder DES
    • Springer LNCS 1267
    • E. Biham, “Cryptanalysis of Ladder DES”, Fast Software Encryption 1997, Springer LNCS 1267, pp. 134–138.
    • Fast Software Encryption 1997 , pp. 134-138
    • Biham, E.1
  • 12
    • 84957612187 scopus 로고    scopus 로고
    • A revised version of Crypton – Crypton V1.0 –
    • Springer LNCS 1636
    • C. H. Lim, “A revised version of Crypton – Crypton V1.0 –”, Fast Software Encryption 1999, Springer LNCS 1636, pp. 31–45.
    • Fast Software Encryption 1999 , pp. 31-45
    • Lim, C.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.