Back to Results
First PageMeta Content
Brute-force attack / Differential cryptanalysis / Key size / Brute-force search / Cryptanalysis / Cryptography / Key management / Advanced Encryption Standard


Document Date: 2005-04-25 21:50:00


Open Document

Share Result on Facebook

City

Santa Barbara / Lund / Berlin / /

Company

the AES / /

Country

Sweden / United States / /

/

Facility

The University of Illinois at Chicago Chicago / /

IndustryTerm

serial brute-force search / incorrect choices among systems / variant key-search circuit / variant parallel brute-force key-search attack / parallel brute-force key-search attack / parallel brute-force key-search machines / less expensive parallel brute-force search / software encryption / exhaustive search / parallel brute-force search / parallel brute-force key-search machine / variant key-search machine / cryptographic protocols / parallel key-search circuits / brute-force key search / cryptographic systems / Brute-force key-search attacks / p/8q key-search circuits / fewer key-search-circuit inputs / parallel key-search machine / brute-force algorithm / /

Organization

National Science Foundation / University of Illinois at Chicago / Daniel J. Bernstein Department of Mathematics / Statistics / and Computer Science / Alfred P. Sloan Foundation / US Federal Reserve / /

Person

John Kelsey / Dan Boneh / Joseph Lano / Doug Whiting / Stefan Lucks / Tadayoshi Kohno / Bart Preneel / Christophe De Canni`ere / Michael J. Wiener / Bruce Schneier / Thomas Johansson / Philippe Oechslin / Daniel J. Bernstein / /

/

Position

editor / author / /

ProgrammingLanguage

C / /

ProvinceOrState

California / /

PublishedMedium

Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

encryption / cryptography / brute-force algorithm / sorting algorithm / software encryption / cryptographic protocols / complicated algorithm / stream cipher / /

URL

http /

SocialTag