obtained by replacing the encryption scheme with its keyless linear eva approximation will be denoted by X . l; The attack of FEAL-li 4.1 ... The following diagram shows the relation between the bytes X: and x: and the bytes X#, X: and x: .

Title | : | Advances in Cryptology — CRYPTO ’91 |

Author | : | Joan Feigenbaum |

Publisher | : | Springer - 2003-06-30 |

Continue