The Boomerang Attack
- 1 January 1999
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 156-170
- https://doi.org/10.1007/3-540-48519-8_12
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Feistel Ciphers with L 2-DecorrelationLecture Notes in Computer Science, 1999
- Fast Software EncryptionPublished by Springer Science and Business Media LLC ,1998
- Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEALecture Notes in Computer Science, 1997
- Truncated and higher order differentialsLecture Notes in Computer Science, 1995
- Higher Order Derivatives and Differential CryptanalysisPublished by Springer Science and Business Media LLC ,1994
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Science and Business Media LLC ,1993