1
by Sakiyama, Kazuo
Published 2015
Wiley
Table of Contents: ...; 254 6.4 Meet-in-the-Middle Fault Analysis 260 6.4.1 Meet-in-the-Middle Attack on Block Ciphers 260...

2
by McAndrew, Alasdair
Published 2012
CRC Press
Table of Contents: ... and knapsacks; Chapter 7. Digital signatures; Chapter 8. Block ciphers and the data encryption standard; Chapter...