Login / Signup
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Deukjo Hong
Jaechul Sung
Seokhie Hong
Wonil Lee
Sangjin Lee
Jongin Lim
Okyeon Yi
Published in:
ASIACRYPT (2001)
Keyphrases
</>
block cipher
hash functions
s box
secret key
power analysis
lightweight
security protocols
application layer
data analysis
motion estimation
low cost