

Author: Christensen Chris
Publisher: Taylor & Francis Ltd
ISSN: 0161-1194
Source: Cryptologia, Vol.35, Iss.1, 2011-01, pp. : 100-105
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Algebraic Cryptanalysis of Simplified AES*
By Simmons Sean
Cryptologia, Vol. 33, Iss. 4, 2009-10 ,pp. :




By Chang Kelly Low Richard M. Stamp Mark
Cryptologia, Vol. 38, Iss. 2, 2014-04 ,pp. :

