-
2
-
-
35248828626
-
Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt
-
Information Security and Cryptology-Icisc 2002, Springer-Verlag, To appear
-
Nicolas Courtois. Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt. In Information Security and Cryptology-Icisc 2002, volume 2587 of Lecture Notes in Computer Science. Springer-Verlag, 2002. To appear.
-
(2002)
Lecture Notes in Computer Science
, vol.2587
-
-
Courtois, N.1
-
3
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT2002, Springer-Verlag
-
Nicolas Courtois and Josef Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT2002, volume 2501 of Lecture Notes in Computer Science, pages 267-287. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
4
-
-
85028746172
-
Resynchronisation weaknesses in synchronous stream ciphers
-
Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Springer-Verlag
-
Joan Daemen, René Govaerts, and Joos Vandewalle. Resynchronisation weaknesses in synchronous stream ciphers. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 159-167. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 159-167
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
5
-
-
84949205030
-
Modes of operation of stream ciphers
-
Douglas R. Stinson and Stafford Tavares, editors, Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Springer-Verlag
-
Jovan Dj. Golić. Modes of operation of stream ciphers. In Douglas R. Stinson and Stafford Tavares, editors, Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, volume 2012 of Lecture Notes in Computer Science, pages 233-247. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2012
, pp. 233-247
-
-
Golić, J.Dj.1
-
6
-
-
84945137421
-
Encryption modes with almost free message integrity
-
Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT2001
-
Charanjit S. Jutla. Encryption modes with almost free message integrity. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT2001, volume 2045 of Lecture Notes in Computer Science, pages 529-544, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 529-544
-
-
Jutla, C.S.1
-
7
-
-
84947941735
-
On the design and security of RC2
-
Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE'98, Springer-Verlag
-
Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and M.J.B. Robshaw. On the design and security of RC2. In Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE'98, volume 1372 of Lecture Notes in Computer Science, pages 206-221. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1372
, pp. 206-221
-
-
Knudsen, L.R.1
Rijmen, V.2
Rivest, R.L.3
Robshaw, M.J.B.4
-
10
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press
-
Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Eighth ACM Conference on Computer and Communications Security (CCS-8), pages 196-205. ACM Press, 2001.
-
(2001)
Eighth ACM Conference on Computer and Communications Security (CCS-8)
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
|