On the Role of Key Schedules in Attacks on Iterated Ciphers

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Original languageEnglish
    Title of host publicationComputer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings : ESORICS
    EditorsLars Ramkilde Knudsen
    VolumeSpringer Lecture Notes in Computer Science, volume 3193
    Publication date2004
    Pages322-334
    ISBN (Print)3-540-22987-6
    Publication statusPublished - 2004

    Cite this