... Stat. Methods in Cryptology, LNCS 3028, pp. 1-7 , 2004. Springer- Verlag Berlin Heidelberg 20042 Introductionwas thought to be “unbreakable” for centuries. This code will be presented in Section ... consult, in particular, the Journal of Cryptology and the various confer-ence proceedings series, e.g., in the Springer Lecture Notes in Computer Sci-ence (EUROCRYPT, CRYPTO, ASIACRYPT, AUSCRYPT, INDOCRYPT,FAST ... related “meet -in- the-middle” attack, which has to do with the well-known birthday paradox fromprobability theory.Finally, we give a short glimpse into quantum cryptography in Chapter 13. In this...