obtained by replacing the encryption scheme with its keyless linear eva approximation will be denoted by X . l; The attack of FEAL-li 4.1 ... The following diagram shows the relation between the bytes X: and x: and the bytes X#, X: and x: .
|Title||:||Advances in Cryptology — CRYPTO ’91|
|Publisher||:||Springer - 2003-06-30|