First Page | Meta Content | |
---|---|---|
Document Date: 2005-04-25 21:50:00Open Document Share Result on FacebookCitySanta Barbara / Lund / Berlin / /Companythe AES / /CountrySweden / United States / / /FacilityThe University of Illinois at Chicago Chicago / /IndustryTermserial brute-force search / incorrect choices among systems / variant key-search circuit / variant parallel brute-force key-search attack / parallel brute-force key-search attack / parallel brute-force key-search machines / less expensive parallel brute-force search / software encryption / exhaustive search / parallel brute-force search / parallel brute-force key-search machine / variant key-search machine / cryptographic protocols / parallel key-search circuits / brute-force key search / cryptographic systems / Brute-force key-search attacks / p/8q key-search circuits / fewer key-search-circuit inputs / parallel key-search machine / brute-force algorithm / /OrganizationNational Science Foundation / University of Illinois at Chicago / Daniel J. Bernstein Department of Mathematics / Statistics / and Computer Science / Alfred P. Sloan Foundation / US Federal Reserve / /PersonJohn Kelsey / Dan Boneh / Joseph Lano / Doug Whiting / Stefan Lucks / Tadayoshi Kohno / Bart Preneel / Christophe De Canni`ere / Michael J. Wiener / Bruce Schneier / Thomas Johansson / Philippe Oechslin / Daniel J. Bernstein / / /Positioneditor / author / /ProgrammingLanguageC / /ProvinceOrStateCalifornia / /PublishedMediumJournal of Cryptology / Lecture Notes in Computer Science / /Technologyencryption / cryptography / brute-force algorithm / sorting algorithm / software encryption / cryptographic protocols / complicated algorithm / stream cipher / /URLhttp /SocialTag |