Cryptology ePrint Archive: Report 2014/699
Available versions in chronological order
20140905:190949 (posted 05-Sep-2014 19:09:49 UTC)
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura and Mar\'ia Naya-Plasencia and Valentin Suder
Original publication (with major differences): IACR-ASIACRYPT-2014
20140909:125333 (posted 09-Sep-2014 12:53:33 UTC)
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)
Christina Boura and Marķa Naya-Plasencia and Valentin Suder
Original publication (with major differences): IACR-ASIACRYPT-2014
[
Cryptology ePrint archive
]