Cryptology ePrint Archive: Report 2013/674

Available versions in chronological order


Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir
Original publication (with minor differences): IACR-ASIACRYPT-2014


[ Cryptology ePrint archive ]