Cryptology ePrint Archive: Report 2009/020

Available versions in chronological order


Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
Jiali Choy and Khoongming Khoo and Chuan-Wen Loe
Publication Info: ICICS 2008, Springer, LNCS 5308, pp. 157-173


[ Cryptology ePrint archive ]