21
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Advances in Cryptology – ASIACRYPT 2014 

      Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

      other

      Read this book at

      Publisher
      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references29

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          The LED Block Cipher

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              How to Construct Pseudorandom Permutations from Pseudorandom Functions

                Bookmark

                Author and book information

                Book Chapter
                2014
                : 439-457
                10.1007/978-3-662-45611-8_23
                cc694e57-ea21-4e7e-ab07-4080bafaee64
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,662

                Cited by2