-
1
-
-
84949218850
-
Camellia: A 128-bit block cipher suitable for multiple platforms
-
Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Springer-Verlag, Berlin
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, "Camellia: A 128-bit block cipher suitable for multiple platforms," Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Lecture Notes in Computer Science 2012, pp.39-56, Springer-Verlag, Berlin, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2012
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
2
-
-
84948955781
-
On Matsui's linear cryptanalysis
-
Advances in Cryptology-EUROCRYPT'94, Springer-Verlag, Berlin
-
E. Biham, "On Matsui's linear cryptanalysis," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp.341-355, Springer-Verlag, Berlin, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 341-355
-
-
Biham, E.1
-
5
-
-
84949229080
-
Practical security evaluation against differential and linear cryptanalyses for feistel ciphers with SPN round function
-
Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Springer-Verlag, Berlin
-
M. Kanda, "Practical security evaluation against differential and linear cryptanalyses for feistel ciphers with SPN round function," Selected Areas in Cryptography-7th Annual International Workshop, SAC2000, Lecture Notes in Computer Science 2012, pp.324-338, Springer-Verlag, Berlin, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2012
, pp. 324-338
-
-
Kanda, M.1
-
6
-
-
0012052654
-
Security of Camellia against truncated differential cryptanalysis
-
in preproceedings. LNCS to appear
-
M. Kanda and T. Matsumoto, "Security of Camellia against truncated differential cryptanalysis," Fast Software Encryption Workshop FSE2001, pp.298-312, in preproceedings, 2001. LNCS to appear.
-
(2001)
Fast Software Encryption Workshop FSE2001
, pp. 298-312
-
-
Kanda, M.1
Matsumoto, T.2
-
7
-
-
0033907160
-
E2-A new 128-bit block cipher
-
Jan.
-
M. Kanda, S. Moriai, K. Aoki, H. Ueda, Y. Takashima, K. Ohta, and T. Matsumoto, "E2-A new 128-bit block cipher," IEICE Trans. Fundamentals, vol. E83-A, no.1, pp.48-59, Jan. 2000.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, Issue.1
, pp. 48-59
-
-
Kanda, M.1
Moriai, S.2
Aoki, K.3
Ueda, H.4
Takashima, Y.5
Ohta, K.6
Matsumoto, T.7
-
8
-
-
84949230440
-
A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis
-
Selected Areas in Cryptography-5th Annual International Workshop, SAC'98, Springer-Verlag, Berlin
-
M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, and K. Ohta, "A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis," Selected Areas in Cryptography-5th Annual International Workshop, SAC'98, Lecture Notes in Computer Science 1556, pp.264-279, Springer-Verlag, Berlin, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1556
, pp. 264-279
-
-
Kanda, M.1
Takashima, Y.2
Matsumoto, T.3
Aoki, K.4
Ohta, K.5
-
9
-
-
85025652210
-
Practically secure feistel ciphers
-
Fast Software Encryption-Cambridge Security Workshop, Springer-Verlag, Berlin
-
L.R. Knudsen, "Practically secure feistel ciphers," Fast Software Encryption-Cambridge Security Workshop, Lecture Notes in Computer Science 809, pp.211-221, Springer-Verlag, Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 211-221
-
-
Knudsen, L.R.1
-
10
-
-
84948949623
-
Truncated and higher order differentials
-
Fast Software Encryption-Second International Workshop, Springer-Verlag, Berlin
-
L.R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption-Second International Workshop, Lecture Notes in Computer Science 1008, pp.196-211, Springer-Verlag, Berlin, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
11
-
-
84958958039
-
Truncated differentials of SAFER
-
Fast Software Encryption-Third International Workshop, Springer-Verlag, Berlin
-
L.R. Knudsen and T.A. Berson, "Truncated differentials of SAFER," Fast Software Encryption-Third International Workshop, Lecture Notes in Computer Science 1039, pp.15-26, Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 15-26
-
-
Knudsen, L.R.1
Berson, T.A.2
-
12
-
-
85019318892
-
SAFER-K64: A byte oriented block-ciphering algorithm
-
Fast Software Encryption-Cambridge Security Workshop, Springer-Verlag, Berlin
-
J.L. Massey, "SAFER-K64: A byte oriented block-ciphering algorithm," Fast Software Encryption-Cambridge Security Workshop, Lecture Notes in Computer Science 809, pp.1-17, Springer-Verlag, Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.809
, pp. 1-17
-
-
Massey, J.L.1
-
13
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Advances in Cryptology-EUROCRYPT'93, Springer-Verlag, Berlin
-
M. Matsui, "Linear cryptanalysis method for DES cipher," Advances in Cryptology-EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.386-397, Springer-Verlag, Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
14
-
-
84948954431
-
On correlation between the order of S-boxes and the strength of DES
-
Advances in Cryptology-EUROCRYPT'94, Springer-Verlag, Berlin
-
M. Matsui, "On correlation between the order of S-boxes and the strength of DES," Advances in Cryptology-EUROCRYPT'94, Lecture Notes in Computer Science 950, pp.366-375, Springer-Verlag, Berlin, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 366-375
-
-
Matsui, M.1
-
15
-
-
4243325408
-
Differential path search of the block cipher E2
-
July
-
M. Matsui, "Differential path search of the block cipher E2," IEICE Technical Report, ISEC99-19, July 1999.
-
(1999)
IEICE Technical Report
, vol.ISEC99-19
-
-
Matsui, M.1
-
16
-
-
35048899696
-
Cryptanalysis of a reduced version of the block cipher E2
-
Fast Software Encryption-6th International Workshop, FSE'99, Springer-Verlag, Berlin
-
M. Matsui and T. Tokita, "Cryptanalysis of a Reduced Ver-sion of the Block Cipher E2," Fast Software Encryption-6th International Workshop, FSE'99, Lecture Notes in Computer Science 1636, pp.71-80, Springer-Verlag, Berlin, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 71-80
-
-
Matsui, M.1
Tokita, T.2
-
17
-
-
0035119642
-
Security of E2 against truncated differential cryptanalysis
-
Jan.
-
S. Moriai, M. Sugita, and M. Kanda, "Security of E2 against truncated differential cryptanalysis," IEICE Trans. Fundamentals, vol. E84-A, no.1, pp.319-325, Jan. 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.1
, pp. 319-325
-
-
Moriai, S.1
Sugita, M.2
Kanda, M.3
-
18
-
-
0012022739
-
-
National Bureau of Standards, Data Encryption Standard, FIPS-PUB-46, 1977.
-
(1977)
Data Encryption Standard
, vol.FIPS-PUB-46
-
-
-
19
-
-
84958979426
-
The cipher SHARK
-
Fast Software Encryption-Third International Workshop, Springer-Verlag, Berlin
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E.D. Win, "The cipher SHARK," Fast Software Encryption-Third International Workshop, Lecture Notes in Computer Science 1039, pp.99-111, Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
Win, E.D.5
|