Skip to Main Content
A simple way of creating new and efficient distinguishers for cryptographic primitives such as block ciphers or hash functions is introduced. This technique is then successfully applied over reduced round versions of the block cipher TEA, which is proven to be weak with less than five rounds.
Evolutionary Computation, 2003. CEC '03. The 2003 Congress on (Volume:3 )
Date of Conference: 8-12 Dec. 2003