Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)

Christina Boura,M. Naya-Plasencia,Valentin Suder

Published 2014 in IACR Cryptology ePrint Archive

ABSTRACT

No abstract is available for this paper.

PUBLICATION RECORD

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-49 of 49 references · Page 1 of 1

CITED BY

Showing 1-100 of 152 citing papers · Page 1 of 2