Security Analysis on the Full-Round SCO-1
Vol. 18, No. 4, pp. 27-36,
Aug.
2008
10.13089/JKIISC.2008.18.4.27, Full Text:
Keywords: block cipher, SCO-1, Data-Dependent Operation, Related-Key Differential Attack, cryptanalysis
Abstract Statistics
Cite this article
10.13089/JKIISC.2008.18.4.27, Full Text:
Keywords: block cipher, SCO-1, Data-Dependent Operation, Related-Key Differential Attack, cryptanalysis
Abstract Statistics
Cite this article
[IEEE Style]
K. Jeong, C. Lee, J. Kim, S. Hong, "Security Analysis on the Full-Round SCO-1," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 4, pp. 27-36, 2008. DOI: 10.13089/JKIISC.2008.18.4.27.
[ACM Style]
Ki-Tae Jeong, Chang-Hoon Lee, Jong-Sung Kim, and Seok-Hie Hong. 2008. Security Analysis on the Full-Round SCO-1. Journal of The Korea Institute of Information Security and Cryptology, 18, 4, (2008), 27-36. DOI: 10.13089/JKIISC.2008.18.4.27.