Login / Signup

On the Role of Key Schedules in Attacks on Iterated Ciphers.

Lars R. KnudsenJohn Erik Mathiassen
Published in: ESORICS (2004)
Keyphrases
  • block cipher
  • chosen plaintext
  • stream cipher
  • hash functions
  • security protocols
  • scheduling problem
  • countermeasures
  • genetic algorithm
  • watermarking scheme
  • watermarking algorithm
  • secret key
  • traffic analysis