-
2
-
-
0026817719
-
On immunity against Biham and Shamir's differential cryptanalysis
-
C. M. Adams. On immunity against Biham and Shamir's differential cryptanalysis. Information Processing Letters, 41(2):77-80,1992.
-
(1992)
Information Processing Letters
, vol.41
, Issue.123
-
-
Adams, C.M.1
-
3
-
-
0025530315
-
The structured design of cryptographically good S-boxes
-
C. M. Adams and S. E. Tavares. The structured design of cryptographically good S-boxes. Journal of Cryptology, 3(l):21-4l, 1990.
-
(1990)
Journal of Cryptology
, vol.3
-
-
Adams, C.M.1
Tavares, S.E.2
-
4
-
-
0020846854
-
The design of complete encryption networks using cryptographically equivalent permutations
-
F. Ayoub. The design of complete encryption networks using cryptographically equivalent permutations. Computers and Security, 2:261-267, 1982.
-
(1982)
Computers and Security
, vol.2
, pp. 261-267
-
-
Ayoub, F.1
-
5
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(l):3-72,1991.
-
(1991)
Journal of Cryptology
, vol.432
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
84985824783
-
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer
-
Springer-Verlag, Berlin
-
E. Biham and A. Shamir. Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer. Advances in Cryptology: Proceedings ofCRYPTO '91, Springer-Verlag, Berlin, pages 156-171, 1992.
-
(1992)
Advances in Cryptology: Proceedings OfCRYPTO '91
, pp. 156-171
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84957677472
-
Differential cryptanalysis of the full 16-round des
-
Springer-Verlag, Berlin
-
E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. Advances in Cryptology: Proceedings ofCRYPTO '92, Springer-Verlag, Berlin, pages 487-496, 1993.
-
(1993)
Advances in Cryptology: Proceedings OfCRYPTO '92
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
84939361741
-
Structures in the S-boxes of des
-
Springer-Verlag, Berlin
-
E. F. Brickell, J. H. Moore, and M. R. Purtill. Structures in the S-boxes of DES. Advances in Cryptology: Proceedings ofCRYPTO '86, Springer-Verlag, Berlin, pages 3-8, 1987.
-
(1987)
Advances in Cryptology: Proceedings OfCRYPTO '86
, pp. 3-8
-
-
Brickell, E.F.1
Moore, J.H.2
Purtill, M.R.3
-
10
-
-
84985833497
-
LOKI-a cryptographic primitive for authentication and secrecy applications
-
Springer-Verlag, Berlin
-
L. Brown, J. Pieprzyk, and J. Seberry. LOKI-a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology: Proceedings ofAUSCRYPT '90, Springer-Verlag, Berlin, pages 229-236, 1990.
-
(1990)
Advances in Cryptology: Proceedings OfAUSCRYPT '90
, pp. 229-236
-
-
Brown, L.1
Pieprzyk, J.2
Seberry, J.3
-
11
-
-
84962952891
-
On the design of permutation P in des type cryptosystems
-
Springer-Verlag, Berlin
-
L. Brown and J. R. Seberry. On the design of permutation P in DES type cryptosystems. Advances in Cryptology: Proceedings ofEUROCRYPT '89, Springer-Verlag, Berlin, pages 696-705, 1989.
-
(1989)
Advances in Cryptology: Proceedings OfEUROCRYPT '89
, pp. 696-705
-
-
Brown, L.1
Seberry, J.R.2
-
12
-
-
85020558749
-
An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks
-
Springer-Verlag, Berlin
-
M. H. Dawson and S. E. Tavares. An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. Advances in Cryptology: Proceedings ofEUROCRYPT '91, Springer-Verlag, Berlin, pages 352-367, 1991.
-
(1991)
Advances in Cryptology: Proceedings OfEUROCRYPT '91
, pp. 352-367
-
-
Dawson, M.H.1
Tavares, S.E.2
-
13
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel. Cryptography and computer privacy. Scientific American, 228(5):15-23, 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
14
-
-
0016579870
-
Some cryptographic techniques for machine-to-machine data communications
-
H. Feistel, W. A. Notz, and J. L. Smith. Some cryptographic techniques for machine-to-machine data communications. Proceedings of the IEEE, 63(11): 1545-1554, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.11
, pp. 1545-1554
-
-
Feistel, H.1
Notz, W.A.2
Smith, J.L.3
-
15
-
-
0025638337
-
Methods and instruments for designing S-boxes
-
R. Forré. Methods and instruments for designing S-boxes. Journal of Cryptology, 2(3):115-130, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.3
, pp. 115-130
-
-
Forré, R.1
-
16
-
-
0018530910
-
A structured design of substitution-permutation encryption networks
-
J. B. Kam and G. I. Davida. A structured design of substitution-permutation encryption networks. IEEE Transactions on Computers, 28(10):747-753, 1979.
-
(1979)
IEEE Transactions on Computers
, vol.28
, Issue.10
, pp. 747-753
-
-
Kam, J.B.1
Davida, G.I.2
-
17
-
-
0009319575
-
Iterative characteristics of des and s2-DES
-
Springer-Verlag, Berlin
-
L. R. Knudsen. Iterative characteristics of DES and s2-DES. Advances in Cryptology: Proceedings of CRYPTO '92, Springer-Verlag, Berlin, pages 497-511, 1993.
-
(1993)
Advances in Cryptology: Proceedings of CRYPTO '92
, pp. 497-511
-
-
Knudsen, L.R.1
-
18
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Springer-Verlag, Berlin
-
M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology: Proceedings of EUROCRYPT '93, Springer-Verlag, Berlin, pages 386-397, 1994.
-
(1994)
Advances in Cryptology: Proceedings of EUROCRYPT '93
, pp. 386-397
-
-
Matsui, M.1
-
20
-
-
0003508568
-
-
Federal Information Processing Standard Publication 46, U.S. Department of Commerce, January
-
National Bureau of Standards. Data Encryption Standard (DES). Federal Information Processing Standard Publication 46, U.S. Department of Commerce, January 1977.
-
(1977)
Data Encryption Standard (DES)
-
-
-
22
-
-
0002206751
-
On the construction of highly nonlinear permutations
-
Springer-Verlag, Berlin
-
K. Nyberg. On the construction of highly nonlinear permutations. Advances in Cryptology: Proceedings ofEUROCRYPT '92, Springer-Verlag, Berlin, pages 92-98, 1992.
-
(1992)
Advances in Cryptology: Proceedings OfEUROCRYPT '92
, pp. 92-98
-
-
Nyberg, K.1
-
23
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
Springer-Verlag, Berlin
-
K. Nyberg. Differentially uniform mappings for cryptography. Advances in Cryptology: Proceedings of EUROCRYPT '93, Springer-Verlag, Berlin, pages 55-64, 1994.
-
(1994)
Advances in Cryptology: Proceedings of EUROCRYPT '93
, pp. 55-64
-
-
Nyberg, K.1
-
25
-
-
84949023413
-
On the distribution of characteristics in bijective mappings
-
Springer-Verlag, Berlin
-
L. J. O'Connor. On the distribution of characteristics in bijective mappings. Advances in Cryptology: Proceedings ofEUROCRYPT '93, Springer-Verlag, Berlin, pages 360-370, 1994.
-
(1994)
Advances in Cryptology: Proceedings OfEUROCRYPT '93
, pp. 360-370
-
-
O'Connor, L.J.1
-
26
-
-
0024106741
-
Towards effective nonlinear cryptosystem design
-
J. Pieprzyk and G. Finkelstein. Towards effective nonlinear cryptosystem design. IEE Proceedings, Part E, 135(6):325-335, 1988.
-
(1988)
IEE Proceedings, Part e
, vol.135
, Issue.6
, pp. 325-335
-
-
Pieprzyk, J.1
Finkelstein, G.2
-
27
-
-
84955621100
-
Propagation characteristics of boolean functions
-
Springer-Verlag, Berlin
-
B. Preneel, W. Van Leekwijck, L. Van Linden, R. Goevarts, and J. Vanderwalle. Propagation characteristics of boolean functions. Advances in Cryptology: Proceedings ofEUROCRYPT '90, Springer-Verlag, Berlin, pages 161-173, 1991.
-
(1991)
Advances in Cryptology: Proceedings OfEUROCRYPT '90
, pp. 161-173
-
-
Preneel, B.1
Van Leekwijck, W.2
Van Linden, L.3
Goevarts, R.4
Vanderwalle, J.5
-
28
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical journal, 28:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
30
-
-
84955601896
-
On the design of SP networks from an informationtheoretic point of view
-
Springer-Verlag, Berlin
-
M. Sivabalan, S. E. Tavares, and L. E. Peppard. On the design of SP networks from an informationtheoretic point of view. Advances in Cryptology: Proceedings ofCRYPTO '92, Springer-Verlag, Berlin, pages 260-279, 1993.
-
(1993)
Advances in Cryptology: Proceedings OfCRYPTO '92
, pp. 260-279
-
-
Sivabalan, M.1
Tavares, S.E.2
Peppard, L.E.3
|