Author:
Abdelraheem Mohamed Ahmed,Blondeau Céline,Naya-Plasencia María,Videau Marion,Zenner Erik
Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. Lecture Notes in Computer Science;S. Badel,2010
2. Lecture Notes in Computer Science;D. Khovratovich,2011
3. Moldovyan, A.A., Moldovyan, N.A.: A Cipher Based on Data-Dependent Permutations. Journal of Cryptology 15(1), 61–72 (2002)
4. Naya-Plasencia, M.: How to Improve Rebound Attacks. Tech. Rep. Report 2010/607, Cryptology ePrint Archive (2010), (extended version)
http://eprint.iacr.org/2010/607.pdf
5. Lecture Notes in Computer Science;M. Naya-Plasencia,2011
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献