BibTeX
CSL-JSON
MLA
Harvard
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
release_eejesz6qbne3zc7g6ehyaaszmy
by
M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
Archived Files and Locations
application/pdf 430.4 kB
file_gb3aoelkzfc7xclm2twlx65w4u
|
eprint.iacr.org (web) web.archive.org (webarchive) |
application/pdf 430.4 kB
file_7q3bn6tvrncphnjibrgokchhza
|
web.archive.org (webarchive) eprint.iacr.org (web) web.archive.org (webarchive) web.archive.org (webarchive) web.archive.org (webarchive) |
application/pdf 277.2 kB
file_6twy4fdvircexhkkp33vlkhiji
|
fse2011.mat.dtu.dk (web) web.archive.org (webarchive) |
application/pdf 297.5 kB
file_7vggpucvh5hntctexvwdlovvgu
|
link.springer.com (publisher) web.archive.org (webarchive) |
application/pdf 359.6 kB
file_foevaklmmzg5hnh2prmdnnwwha
|
web.archive.org (webarchive) pdfs.semanticscholar.org (aggregator) |
Read Archived PDF
Preserved and Accessible
Type
Stage
Year 2011
chapter
Stage
published
Year 2011
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
access all versions, variants, and formats of this works (eg, pre-prints)
Cite This
Lookup Links
oaDOI/unpaywall (OA fulltext)
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar