Login / Signup
On the Role of Key Schedules in Attacks on Iterated Ciphers.
Lars R. Knudsen
John Erik Mathiassen
Published in:
ESORICS (2004)
Keyphrases
</>
block cipher
chosen plaintext
stream cipher
hash functions
security protocols
scheduling problem
countermeasures
genetic algorithm
watermarking scheme
watermarking algorithm
secret key
traffic analysis