Back to Results
First PageMeta Content
Weak key / GOST / Blowfish / Differential cryptanalysis / ICE / Khufu and Khafre / Block cipher / Ciphertext / Advantage / Cryptography / GOST standards / Key schedule


Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier
Add to Reading List

Document Date: 2014-03-02 23:18:30


Open Document

File Size: 201,51 KB

Share Result on Facebook

City

Minneapolis / /

Company

DES John Kelsey Bruce Schneier Counterpane Systems / CBC / Knudsen / /

/

Event

FDA Phase / /

IndustryTerm

2PKDP protocol / 2PKDP key distribution protocol / actual protocols / real cryptographic applications / decryption algorithm / i.e. applications / public-key protocol / exhaustive key search / symmetric-key protocols / exhaustive search / Secure communications protocols / /

Person

Bob / Alice / David Wagner / /

/

Position

General / /

Product

Pyle P32 Television / TH93 / /

ProvinceOrState

Minnesota / /

Technology

encryption / Secure communications protocols / public-key protocol / S/N / public key / key exchange protocols / 2PKDP key distribution protocol / key-exchange protocol / block cipher / underlying algorithms / symmetric-key protocols / 6 Key exchange protocols / key distribution protocols / 2PKDP protocol / decryption algorithm / 2k−n offline trial encryptions / stream cipher / /

SocialTag