Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon release_dkoq7okngncznadjy3r7f4bor4

by Christina Boura, María Naya-Plasencia, Valentin Suder

Published in Lecture Notes in Computer Science by Springer Berlin Heidelberg.

2014   p179-199

Archived Files and Locations

application/pdf  451.9 kB
file_vvvlrh4ejfc2raei4q3xwetquy
web.archive.org (webarchive)
suder.xyz (web)
application/pdf  399.2 kB
file_axpjcqbkjngixjjo3pprvqqndm
web.archive.org (webarchive)
link.springer.com (publisher)
Read Archived PDF
Preserved and Accessible
Type  chapter
Stage   published
Year   2014
Container Metadata
Not in DOAJ
Not in Keepers Registry
ISSN-L:  0302-9743
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 31076b98-1a01-4e95-9048-52ca22e52cfb
API URL: JSON