Login / Signup

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.

Deukjo HongJaechul SungSeokhie HongWonil LeeSangjin LeeJongin LimOkyeon Yi
Published in: ASIACRYPT (2001)
Keyphrases
  • block cipher
  • hash functions
  • s box
  • secret key
  • power analysis
  • lightweight
  • security protocols
  • application layer
  • data analysis
  • motion estimation
  • low cost