메뉴 건너뛰기




Volumn 2887, Issue , 2003, Pages 330-346

Helix: Fast encryption and authentication in a single cryptographic primitive

Author keywords

Authentication; Encryption; MAC; Stream cipher

Indexed keywords

CRYPTOGRAPHY; PUBLIC KEY CRYPTOGRAPHY;

EID: 0242571721     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39887-5_24     Document Type: Article
Times cited : (74)

References (11)
  • 2
    • 35248828626 scopus 로고    scopus 로고
    • Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt
    • Information Security and Cryptology-Icisc 2002, Springer-Verlag, To appear
    • Nicolas Courtois. Higher order correlation attacks, XL algorithm, and cryptanalysis of Toyocrypt. In Information Security and Cryptology-Icisc 2002, volume 2587 of Lecture Notes in Computer Science. Springer-Verlag, 2002. To appear.
    • (2002) Lecture Notes in Computer Science , vol.2587
    • Courtois, N.1
  • 3
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT2002, Springer-Verlag
    • Nicolas Courtois and Josef Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Yuliang Zheng, editor, Advances in Cryptology - ASIACRYPT2002, volume 2501 of Lecture Notes in Computer Science, pages 267-287. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 4
    • 85028746172 scopus 로고
    • Resynchronisation weaknesses in synchronous stream ciphers
    • Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Springer-Verlag
    • Joan Daemen, René Govaerts, and Joos Vandewalle. Resynchronisation weaknesses in synchronous stream ciphers. In Tor Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, volume 765 of Lecture Notes in Computer Science, pages 159-167. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 159-167
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 5
    • 84949205030 scopus 로고    scopus 로고
    • Modes of operation of stream ciphers
    • Douglas R. Stinson and Stafford Tavares, editors, Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Springer-Verlag
    • Jovan Dj. Golić. Modes of operation of stream ciphers. In Douglas R. Stinson and Stafford Tavares, editors, Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, volume 2012 of Lecture Notes in Computer Science, pages 233-247. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2012 , pp. 233-247
    • Golić, J.Dj.1
  • 6
    • 84945137421 scopus 로고    scopus 로고
    • Encryption modes with almost free message integrity
    • Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT2001
    • Charanjit S. Jutla. Encryption modes with almost free message integrity. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT2001, volume 2045 of Lecture Notes in Computer Science, pages 529-544, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 529-544
    • Jutla, C.S.1
  • 7
    • 84947941735 scopus 로고    scopus 로고
    • On the design and security of RC2
    • Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE'98, Springer-Verlag
    • Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, and M.J.B. Robshaw. On the design and security of RC2. In Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE'98, volume 1372 of Lecture Notes in Computer Science, pages 206-221. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1372 , pp. 206-221
    • Knudsen, L.R.1    Rijmen, V.2    Rivest, R.L.3    Robshaw, M.J.B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.