On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model release_eejesz6qbne3zc7g6ehyaaszmy

by M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson

Published in Lecture Notes in Computer Science by Springer Berlin Heidelberg.

2011   p128-145

Archived Files and Locations

application/pdf  430.4 kB
file_gb3aoelkzfc7xclm2twlx65w4u
eprint.iacr.org (web)
web.archive.org (webarchive)
application/pdf  430.4 kB
file_7q3bn6tvrncphnjibrgokchhza
web.archive.org (webarchive)
eprint.iacr.org (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
application/pdf  277.2 kB
file_6twy4fdvircexhkkp33vlkhiji
fse2011.mat.dtu.dk (web)
web.archive.org (webarchive)
application/pdf  297.5 kB
file_7vggpucvh5hntctexvwdlovvgu
link.springer.com (publisher)
web.archive.org (webarchive)
application/pdf  359.6 kB
file_foevaklmmzg5hnh2prmdnnwwha
web.archive.org (webarchive)
pdfs.semanticscholar.org (aggregator)
Read Archived PDF
Preserved and Accessible
Type  chapter
Stage   published
Year   2011
Container Metadata
Not in DOAJ
Not in Keepers Registry
ISSN-L:  0302-9743
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 753c71d0-f6f3-4954-a1cd-c705bf59fe9c
API URL: JSON