메뉴 건너뛰기




Volumn E79-A, Issue 1, 1996, Pages 35-47

Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32, and Skipjack

Author keywords

Block cipher; Cryptanalysis; Time memory trade off

Indexed keywords

CALCULATIONS; COMPUTATIONAL COMPLEXITY; ESTIMATION; OPTIMIZATION; PARALLEL PROCESSING SYSTEMS; PROBABILITY; SECURITY OF DATA; STANDARDS; TABLE LOOKUP;

EID: 0029733777     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (25)

References (19)
  • 1
    • 84903595110 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Advances in Cryptology - Proceedings of CRYPTO'90, Springer-Verlag
    • E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosystems," Advances in Cryptology - Proceedings of CRYPTO'90, Lecture Notes in Computer Science, vol.537, pp.2-21, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 2
    • 85030450942 scopus 로고
    • Differential cryptanalysis of FEAL and N-hash
    • Advances in Cryptology - Proceedings of EUROCRYPT'91, Springer-Verlag
    • E. Biham and A. Shamir, "Differential cryptanalysis of FEAL and N-hash," Advances in Cryptology - Proceedings of EUROCRYPT'91, Lecture Notes in Computer Science, vol.547, pp.1-16, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 1-16
    • Biham, E.1    Shamir, A.2
  • 3
    • 84957677472 scopus 로고
    • Differential cryptanalysis of the full 16-round des
    • Advances in Cryptology - Proceedings of CRYPTO'92, Springer-Verlag
    • E. Biham and A. Shamir, "Differential cryptanalysis of the full 16-round DES," Advances in Cryptology - Proceedings of CRYPTO'92, Lecture Notes in Computer Science, vol.740, pp.487-496, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 487-496
    • Biham, E.1    Shamir, A.2
  • 5
    • 85028757148 scopus 로고
    • Improving resistance to differential cryptanalysis and the redesign of LOKI
    • Advances in Cryptology - Proceedings of ASIACRYPT'91, Springer-Verlag
    • L. Brown, M. Kwan, J. Pieprzyk, and J. Seberry, "Improving resistance to differential cryptanalysis and the redesign of LOKI," Advances in Cryptology - Proceedings of ASIACRYPT'91, Lecture Notes in Computer Science, vol.739, pp.36-50, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.739 , pp. 36-50
    • Brown, L.1    Kwan, M.2    Pieprzyk, J.3    Seberry, J.4
  • 6
    • 84956861959 scopus 로고
    • High-speed des implementation for network applications
    • Advances in Cryptology - Proceedings of CRYPTO'92, Springer-Verlag
    • H. Eberle, "High-speed DES implementation for network applications," Advances in Cryptology - Proceedings of CRYPTO'92, Lecture Notes in Computer Science, vol.740, pp.521-539, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 521-539
    • Eberle, H.1
  • 7
    • 33746834128 scopus 로고
    • DES watch: An examination of the data encryption standard for financial institution information security in the 1990's
    • G. Garon and R. Outerbridge, "DES watch: an examination of the data encryption standard for financial institution information security in the 1990's," Cryptologia, vol.15, no.3, pp.177-193, 1991.
    • (1991) Cryptologia , vol.15 , Issue.3 , pp. 177-193
    • Garon, G.1    Outerbridge, R.2
  • 8
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • M.E. Hellman, "A cryptanalytic time-memory trade-off," IEEE Transactions on Information Theory, vol.IT-26, no.4, pp.401-406, 1980.
    • (1980) IEEE Transactions on Information Theory , vol.IT-26 , Issue.4 , pp. 401-406
    • Hellman, M.E.1
  • 10
    • 35048892576 scopus 로고
    • Cryptanalysis of LOKI'91
    • Advances in Cryptology - Proceedings of AUSCRYPT'92, Springer-Verlag
    • L.R. Knudsen, "Cryptanalysis of LOKI'91," Advances in Cryptology - Proceedings of AUSCRYPT'92, Lecture Notes in Computer Science, vol.718, pp.196-208, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.718 , pp. 196-208
    • Knudsen, L.R.1
  • 11
    • 85028910917 scopus 로고
    • Markov ciphers and differential cryptananlysis
    • Advances in Cryptology - Proceedings of EUROCRYPT'91, Springer-Verlag
    • X. Lai, J.L. Massey, and S. Murphy "Markov ciphers and differential cryptananlysis," Advances in Cryptology - Proceedings of EUROCRYPT'91, Lecture Notes in Computer Science, vol.547, pp.17-38, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 17-38
    • Lai, X.1    Massey, J.L.2    Murphy, S.3
  • 12
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Advances in Cryptology - Proceedings of EUROCRYPT'93, Springer-Verlag
    • M. Matsui, "Linear cryptanalysis method for DES cipher," Advances in Cryptology - Proceedings of EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, pp.386-39, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 386-439
    • Matsui, M.1
  • 13
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • Advances in Cryptology - Proceedings of CRYPTO'94, Springer-Verlag
    • M. Matsui, "The first experimental cryptanalysis of the Data Encryption Standard," Advances in Cryptology - Proceedings of CRYPTO'94, Lecture Notes in Computer Science, vol.839, pp.1-11, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 1-11
    • Matsui, M.1
  • 15
    • 0003508568 scopus 로고
    • U.S. Department of Commerce, FIPS pub.46
    • National Bureau of Standards, "Data Encryption Standard," U.S. Department of Commerce, FIPS pub.46, 1977.
    • (1977) Data Encryption Standard
  • 16
    • 85028765045 scopus 로고
    • Linear cryptanalysis of the Fast Data Encipherment Algorithm
    • Advances in Cryptology - Proceedings of CRYPTO'94, Springer-Verlag
    • K. Ohta and K. Aoki, "Linear cryptanalysis of the Fast Data Encipherment Algorithm," Advances in Cryptology - Proceedings of CRYPTO'94, Lecture Notes in Computer Science, vol.839, pp.12-16, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 12-16
    • Ohta, K.1    Aoki, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.