您当前的位置:
首页 >
文章列表页 >
Meet-in-the-middle attacks on FOX block cipher
Correspondences | 更新时间:2024-10-11
    • Meet-in-the-middle attacks on FOX block cipher

    • Journal on Communications   Vol. 37, Issue 8, Pages: 185-190(2016)
    • DOI:10.11959/j.issn.1000-436x.2016168    

      CLC: TP918.1
    • Online First:2016-08

      Published:25 August 2016

    移动端阅览

  • IRong-jia L, INChen-hui J. Meet-in-the-middle attacks on FOX block cipher[J]. Journal on Communications, 2016, 37(8): 185-190. DOI: 10.11959/j.issn.1000-436x.2016168.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

711

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Zero correlation-integral attack of MIBS block cipher
Meet-in-the-middle attack on 11-round 3D cipher
Improved meet-in-the-middle attack on ARIA cipher
Integral attack on MIBS block cipher
3-subset meet-in-the-middle attack on block cipher TWIS

Related Author

Feng-mei LIU
Meng MA
Ya-qun ZHAO
Qing-cong LIU
Shao-zhen CHEN
Jiong-jiong REN
Man-man LI
Shao-zhen CHEN

Related Institution

. 信息工程大学数学与先进计算国家重点实验室,河南 郑州 450001;2. 信息保障技术重点实验室
Science and Technology on Information Assurance Laboratory
State Key Laboratory of Mathematical Engineering and Advanced Computing, Information Engineering University
State Key Laboratory of Mathematical Engineering and Advanced Computing
Faculty of Cyberspace Secrity, PLA Information Engineering University
0