Login / Signup
The Rectangle Attack - Rectangling the Serpent.
Eli Biham
Orr Dunkelman
Nathan Keller
Published in:
IACR Cryptol. ePrint Arch. (2001)
Keyphrases
</>
block cipher
encryption algorithm
s box
lightweight
secret key
hash functions
security analysis
digital content
security protocols
databases
pseudorandom
minimum bounding
image quality
smart card
encryption scheme
application layer