-
1
-
-
84957634424
-
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
-
Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
-
E. Biham, A. Biryukov and A. Shamir, Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials, Advances in Cryptology - EUROCRYPT'99, LNCS 1592, pp. 12-23, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
2
-
-
35248868015
-
Rectangle Attacks on 49-Round SHACAL-1
-
Springer-Verlag
-
E. Biham, O. Dunkelman and N. Keller, Rectangle Attacks on 49-Round SHACAL-1, FSE 2003, Springer-Verlag, 2003.
-
(2003)
FSE 2003
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
3
-
-
84957677472
-
Differential cryptanalysis of the full 16-round des
-
Advances in Cryptology - CRYPTO'92, Springer-Verlag
-
E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology - CRYPTO'92, LNCS 740, pp. 487-496, Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.740
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
84937572686
-
Analysis of SHA-1 in Encryption Mode
-
CT-RSA 2001, Springer-Verlag
-
H. Handschuh, L. R. Knudsen and M. J. Robshaw, Analysis of SHA-1 in Encryption Mode, CT-RSA 2001, LNCS 2020, pp. 70-83, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2020
, pp. 70-83
-
-
Handschuh, H.1
Knudsen, L.R.2
Robshaw, M.J.3
-
6
-
-
84958740228
-
Amplified Boomerang Attack against Reduced-Round SHACAL
-
Advances in Cryptology, ASI-ACRYPT 2002, Springer-Verlag
-
J.S. Kim, D.J. Moon, W.L. Lee, S.H. Hong, S.J. Lee and S.W. Jung, Amplified Boomerang Attack against Reduced-Round SHACAL, Advances in Cryptology, ASI-ACRYPT 2002, LNCS 2501, pp. 243-253, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 243-253
-
-
Kim, J.S.1
Moon, D.J.2
Lee, W.L.3
Hong, S.H.4
Lee, S.J.5
Jung, S.W.6
-
7
-
-
84949443075
-
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
-
FSE 2002, Springer-Verlag
-
D.J. Moon, K.D. Hwang, W.I. Lee, S.J. Lee and J.I. Lim, Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA, FSE 2002, LNCS 2365, pp.49-60, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2365
, pp. 49-60
-
-
Moon, D.J.1
Hwang, K.D.2
Lee, W.I.3
Lee, S.J.4
Lim, J.I.5
-
9
-
-
35248835283
-
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5
-
advances in Cryptology
-
M.-J.O. Saarinen, Cryptanalysis of Block Ciphers Based on SHA-1 and MD5, advances in Cryptology, proc. of FSE 2003.
-
Proc. of FSE 2003
-
-
Saarinen, M.-J.O.1
-
11
-
-
4043135942
-
FIPS 180-2: Secure Hash Standard
-
N.I.S.T., August
-
U.S. Department of Commerce. FIPS 180-2: Secure Hash Standard ,Federal Information Processing Standards Publication, N.I.S.T., August 2002.
-
(2002)
Federal Information Processing Standards Publication
-
-
|