Dynamic swapping schemes and differential cryptanalysis (1994)
- Authors:
- Autor USP: TERADA, ROUTO - IME
- Unidade: IME
- Assunto: CRIPTOLOGIA
- Keywords: differential cryptanalysis; secret key cryptosystem; characteristic probability; dynamic swapping scheme
- Language: Inglês
- Imprenta:
- Source:
- Título: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
- ISSN: 0916-8508
- Volume/Número/Paginação/Ano: v. E77-A, n. 8, p. 1328-1336, 1994
-
ABNT
KANEKO, Toshinobu e KOYAMA, Kenji e TERADA, Routo. Dynamic swapping schemes and differential cryptanalysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v. E77-A, n. 8, p. 1328-1336, 1994Tradução . . Disponível em: https://search.ieice.org/bin/summary.php?id=e77-a_8_1328&category=A&year=1994&lang=E&abst=. Acesso em: 28 dez. 2025. -
APA
Kaneko, T., Koyama, K., & Terada, R. (1994). Dynamic swapping schemes and differential cryptanalysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E77-A( 8), 1328-1336. Recuperado de https://search.ieice.org/bin/summary.php?id=e77-a_8_1328&category=A&year=1994&lang=E&abst= -
NLM
Kaneko T, Koyama K, Terada R. Dynamic swapping schemes and differential cryptanalysis [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1994 ; E77-A( 8): 1328-1336.[citado 2025 dez. 28 ] Available from: https://search.ieice.org/bin/summary.php?id=e77-a_8_1328&category=A&year=1994&lang=E&abst= -
Vancouver
Kaneko T, Koyama K, Terada R. Dynamic swapping schemes and differential cryptanalysis [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1994 ; E77-A( 8): 1328-1336.[citado 2025 dez. 28 ] Available from: https://search.ieice.org/bin/summary.php?id=e77-a_8_1328&category=A&year=1994&lang=E&abst= - Algoritmos rápidos para ordenação em paralelo
- Introducao a complexidade de algoritmos paralelos
- RSA and elliptic curve least significant bit security
- Classes de computação paralela e exemplos de problemas que admitem algoritmos paralelos rápidos
- Explorando esquemas criptográficos pós-quânticos considerados pelo NIST com implementação em Sage
- Factoring a multiprime modulus N with random bits
- Attacking and defending post-quantum cryptography candidates
- Java cryptographic library for smartphones
- Linear and differential cryptanalysis of FEAL-N with swapping
- Comparison of two signature schemes based on the MQ problem and quartz
How to cite
A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
