Cryptanalysis of WIDEA
From MaRDI portal
Publication:2946870
DOI10.1007/978-3-662-43933-3_3zbMath1321.94073OpenAlexW1448092982MaRDI QIDQ2946870
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-43933-3_3
Related Items (2)
The parallel-cut meet-in-the-middle attack ⋮ Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Variables as stacks. A case study in dynamic model theory
- Narrow-Bicliques: Cryptanalysis of Full IDEA
- Revisiting the IDEA Philosophy
- A New Attack on 6-Round IDEA
- A Unified Approach to Related-Key Attacks
- The Key-Dependent Attack on Block Ciphers
- Markov Ciphers and Differential Cryptanalysis
- On the (In)Security of IDEA in Various Hashing Modes
- Collisions for the WIDEA-8 Compression Function
This page was built for publication: Cryptanalysis of WIDEA