Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
Crossref DOI link: https://doi.org/10.1007/s00145-015-9207-3
Published Online: 2015-04-18
Published Print: 2016-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dinur, Itai
Dunkelman, Orr
Keller, Nathan
Shamir, Adi
Text and Data Mining valid from 2015-04-18
Article History
Received: 26 December 2013
First Online: 18 April 2015
Free to read: This content has been made available to all.