-
2
-
-
84957677472
-
-
vol. 740. Berlin, Germany: Springer-Verlag, 1992, pp. 487-496.
-
E. Biham and A. Shamir, "Differential cryptanalysis of the full 16-round DES," in Advances in Cryptology, Proceedings of Crypto'92 (Lecture Notes in Computer Science, vol. 740). Berlin, Germany: Springer-Verlag, 1992, pp. 487-496.
-
"Differential Cryptanalysis of the Full 16-round DES," in Advances in Cryptology, Proceedings of Crypto'92 Lecture Notes in Computer Science
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
33747271278
-
-
vol. 950. Berlin, Germany: Springer-Verlag, 1994, , pp. 341-355.
-
E. Biham, "On Matsui's linear cryptanalysis," in Advances in Cryptology, Proceedings of Euro Crypt '94 (Lecture Notes in Computer Science, vol. 950). Berlin, Germany: Springer-Verlag, 1994, , pp. 341-355.
-
"On Matsui's Linear Cryptanalysis," in Advances in Cryptology, Proceedings of Euro Crypt '94 Lecture Notes in Computer Science
-
-
Biham, E.1
-
4
-
-
0029632042
-
-
no. 1, pp. 1-25, 1995.
-
D. Davies and S. Murphy, "Pairs and triples of DES S-boxes," J. Cryptol., vol. 8, no. 1, pp. 1-25, 1995.
-
"Pairs and Triples of des S-boxes," J. Cryptol., Vol. 8
-
-
Davies, D.1
Murphy, S.2
-
5
-
-
85032206316
-
-
"Dependence of putput on input in DES: Small Acalaance characteritics," in Advances in Cryptology, Proceedings of Crypto'84 (Lecture Notes in Computer Science, vol. 196). Berlin, Germany: Springer-Verlag, 1984, pp. 359-375.
-
Y. Desmedt, J.-J. Quisquater, and M. Davio, "Dependence of putput on input in DES: Small Acalaance characteritics," in Advances in Cryptology, Proceedings of Crypto'84 (Lecture Notes in Computer Science, vol. 196). Berlin, Germany: Springer-Verlag, 1984, pp. 359-375.
-
J.-J. Quisquater, and M. Davio
-
-
Desmedt, Y.1
-
6
-
-
0017501281
-
-
no. 6, pp. 74-84, June 1977.
-
W. Diffie and M. E. Hellman, "Exhaustive cryptanalysis of the NBS data encryption standard," Computers, vol. 10, no. 6, pp. 74-84, June 1977.
-
"Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computers, Vol. 10
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
33747233701
-
-
no. 2, pp. 120-128, Apr. 1997.
-
G. Gong and Z. D. Dai, "Construction of SAC permutations," Syst. Sci. Math. Sci., vol. 10, no. 2, pp. 120-128, Apr. 1997.
-
"Construction of SAC Permutations," Syst. Sci. Math. Sci., Vol. 10
-
-
Gong, G.1
Dai, Z.D.2
-
10
-
-
84957644147
-
-
B. S. Kaliski and Y. L. Yin, "On differential and linear cryptanalysis of RC5 encryption algorithm," in Advances in Cryptology, Proceedings ofCrypto'95 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1995, pp. 171-183.
-
"On Differential and Linear Cryptanalysis of RC5 Encryption Algorithm," in Advances in Cryptology, Proceedings OfCrypto'95 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1995, Pp. 171-183.
-
-
Kaliski, B.S.1
Yin, Y.L.2
-
12
-
-
84955594777
-
-
Vol. 110. Berlin, Germany: Springer-Verlag, 1996, pp. 216-228.
-
L. R. Knudsen and W. Meier, "Improved differential attacks on RC5," in Advances in Cryptology, Proceedings of Crypto '96 (Lecture Notes in Computer Science, Vol. 110). Berlin, Germany: Springer-Verlag, 1996, pp. 216-228.
-
"Improved Differential Attacks on RC5," in Advances in Cryptology, Proceedings of Crypto '96 Lecture Notes in Computer Science
-
-
Knudsen, L.R.1
Meier, W.2
-
15
-
-
85025704284
-
-
Vol. 765. Berlin, Germany: Springer-Verlag, 1993, pp. 386-397.
-
M. Matsui, "Linear cryptanalysis method for DES cipher," in Advances in Cryptology, Proceedings of EuroCrypt'93 (Lecture Notes in Computer Science, Vol. 765). Berlin, Germany: Springer-Verlag, 1993, pp. 386-397.
-
"Linear Cryptanalysis Method for des Cipher," in Advances in Cryptology, Proceedings of EuroCrypt'93 Lecture Notes in Computer Science
-
-
Matsui, M.1
-
17
-
-
33747242624
-
-
in Proc. Fast Software Encryption, R. Anderson, Ed. (Lecture Notes in Computer Science, no. 809). New York Springer, 1994, pp. 1-17.
-
"SAFER K-64: A byte-oriented block-ciphering algorithm," in Proc. Fast Software Encryption, R. Anderson, Ed. (Lecture Notes in Computer Science, no. 809). New York Springer, 1994, pp. 1-17.
-
SAFER K-64: A Byte-oriented Block-ciphering Algorithm,"
-
-
-
19
-
-
84940007880
-
-
Germany: Springer-Verlag, 1989, pp. 80-92.
-
J. P. Pieprzyk, "Nonlinearity of exponent permutations," in Advances in Cryptology, Proceedings of EuroCrypt'89 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1989, pp. 80-92.
-
"Nonlinearity of Exponent Permutations," in Advances in Cryptology, Proceedings of EuroCrypt'89 (Lecture Notes in Computer Science). Berlin
-
-
Pieprzyk, J.P.1
-
20
-
-
33747311859
-
-
vol. 196. Berlin, Germany: Springer-Verlag, 1984, pp. 377-389.
-
I. A. Reeds and J. L. Manferdelli, "DES has no per round factors," in Advances in Cryptology, Proceedings of Crypto '84 (Lecture Notes in Computer Science, vol. 196). Berlin, Germany: Springer-Verlag, 1984, pp. 377-389.
-
"DES Has No per Round Factors," in Advances in Cryptology, Proceedings of Crypto '84 Lecture Notes in Computer Science
-
-
Reeds, I.A.1
Manferdelli, J.L.2
-
25
-
-
85027125536
-
-
and B. K. Levitt, Spread Spectrum Communications Handbook New York: McGraw-Hill, 1985; revised edition: Rockville, MD: Computer Science, 1994.
-
M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook New York: McGraw-Hill, 1985; revised edition: Rockville, MD: Computer Science, 1994.
-
J. K. Omura, R. A. Scholtz
-
-
Simon, M.K.1
-
26
-
-
85020573990
-
-
vol. 218. Berlin, Germany: Springer-Verlag, 1986, pp. 523-534.
-
A. F. Webster and S. E. Tavares, "On the design of S-boxes," in Advances in Cryptology, Proceedings of Crypto '85 (Lecture Notes in Computer Science, vol. 218). Berlin, Germany: Springer-Verlag, 1986, pp. 523-534.
-
"On the Design of S-boxes," in Advances in Cryptology, Proceedings of Crypto '85 Lecture Notes in Computer Science
-
-
Webster, A.F.1
Tavares, S.E.2
-
27
-
-
33747238191
-
-
no. 5, pp. 316-333, 1995.
-
X. M. Zhang and Y. Zheng, "GAC-The criterion for global avalanche characteristics of cryptographic functions," J. Universal Comput. Sci., vol. 1, no. 5, pp. 316-333, 1995.
-
"GAC-The Criterion for Global Avalanche Characteristics of Cryptographic Functions," J. Universal Comput. Sci., Vol. 1
-
-
Zhang, X.M.1
Zheng, Y.2
|