-
2
-
-
84948980795
-
Correlation matrices
-
B. Preneel, ed., LNCS, Springer-Verlag
-
J. Daemen, R. Govaerts and J. Vandewalle, Correlation matrices, Fast Software Encryption (B. Preneel, ed.), LNCS, Springer-Verlag, 1008 (1995) pp. 275-285.
-
(1995)
Fast Software Encryption
, vol.1008
, pp. 275-285
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
4
-
-
84947444236
-
The block cipher Square
-
(E. Biham, ed.), LNCS, Springer-Verlag
-
J. Daemen, L. Knudsen, V. Rijmen, The block cipher Square, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 149-165.
-
(1997)
Fast Software Encryption
, vol.1267
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.2
Rijmen, V.3
-
6
-
-
84947913977
-
TWOPRIME: A fast stream ciphering algorithm
-
(E. Biham, ed.), LNCS, Springer-Verlag
-
C. Ding, V. Niemi, A. Renvall and A. Salomaa, TWOPRIME: a fast stream ciphering algorithm, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 88-102.
-
(1997)
Fast Software Encryption
, vol.1267
, pp. 88-102
-
-
Ding, C.1
Niemi, V.2
Renvall, A.3
Salomaa, A.4
-
7
-
-
0001820140
-
Cryptography and computer privacy
-
May
-
H. Feistel, Cryptography and computer privacy, Scientific American, Vol. 228, No. 5 (May 1973) pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
8
-
-
0003099980
-
Substitution-permutation networks resistant to differential and linear cryptanalysis
-
H. M. Heys and S. E. Tavares, Substitution-permutation networks resistant to differential and linear cryptanalysis, Journal of Cryptology, Vol. 9, No. 1, (1996), pp. 1-20.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.1
, pp. 1-20
-
-
Heys, H.M.1
Tavares, S.E.2
-
9
-
-
84947929289
-
The interpolation attack on block ciphers
-
E. Biham, ed., LNCS, Springer-Verlag
-
T. Jakobsen and L. R. Knudsen, The interpolation attack on block ciphers, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 28-40.
-
(1997)
Fast Software Encryption
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
10
-
-
0346858443
-
A recursive construction method of S-boxes satisfying strict avalanche criterion
-
S. Vanstone, ed., LNCS, Springer-Verlag
-
K. Kim, T. Matsumoto and H. Imai, A recursive construction method of S-boxes satisfying strict avalanche criterion, Advances in Cryptology, Proc. Crypto '90 (S. Vanstone, ed.), LNCS, Springer-Verlag, 537 (1991) pp. 564-575.
-
(1991)
Advances in Cryptology, Proc. Crypto '90
, vol.537
, pp. 564-575
-
-
Kim, K.1
Matsumoto, T.2
Imai, H.3
-
11
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
D. W. Davies, ed., LNCS, Springer-Verlag
-
X. Lai, J. L. Massey and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology, Proceedings Eurocrypt '91 (D. W. Davies, ed.), LNCS, Springer-Verlag, 547 (1991) pp. 17-38.
-
(1991)
Advances in Cryptology, Proceedings Eurocrypt '91
, vol.547
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
14
-
-
85019318892
-
SAFER-K64, a byte-oriented block-ciphering algorithm
-
(R. Anderson, ed.), LNCS, Springer-Verlag
-
J. Massey, SAFER-K64, a byte-oriented block-ciphering algorithm, Fast Software Encryption (R. Anderson, ed.), LNCS, Springer-Verlag, 809 (1994) pp. 1-17.
-
(1994)
Fast Software Encryption
, vol.809
, pp. 1-17
-
-
Massey, J.1
-
16
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
(T. Helleseth, ed.), LNCS, Springer-Verlag
-
M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology, Proceedings Eurocrypt '93 (T. Helleseth, ed.), LNCS, Springer-Verlag, 765 (1994) pp. 386-397.
-
(1994)
Advances in Cryptology, Proceedings Eurocrypt '93
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
17
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
(T. Helleseth, ed.), LNCS, Springer-Verlag
-
K. Nyberg, Differentially uniform mappings for cryptography, Advances in Cryptology, Proc. Eurocrypt' 93 (T. Helleseth, ed.), LNCS, Springer-Verlag, 765 (1994) pp. 55-64.
-
(1994)
Advances in Cryptology, Proc. Eurocrypt' 93
, vol.765
, pp. 55-64
-
-
Nyberg, K.1
-
18
-
-
84958979426
-
The cipher SHARK
-
(D. Gollmann, ed.) LNCS, Springer-Verlag
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, The cipher SHARK, Fast Software Encryption (D. Gollmann, ed.) LNCS, Springer-Verlag, 1039 (1996) pp. 99-111.
-
(1996)
Fast Software Encryption
, vol.1039
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
De Win, E.5
-
19
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, No. 30 (1949) pp. 50-64.
-
(1949)
Bell System Technical Journal
, Issue.30
, pp. 50-64
-
-
Shannon, C.E.1
-
20
-
-
0348119054
-
On the avalanche characteristics of substitution permutation networks
-
(J. Pfibyl, ed.), CTU Publishing House, Prague
-
S. Tavares and A. M. Youssef, On the avalanche characteristics of substitution permutation networks, Proceedings of Pragocrypt '96 (J. Pfibyl, ed.), CTU Publishing House, Prague (1996) pp. 18-29.
-
(1996)
Proceedings of Pragocrypt '96
, pp. 18-29
-
-
Tavares, S.1
Youssef, A.M.2
-
21
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
(B. Preneel, ed.), LNCS, Springer-Verlag
-
S. Vaudenay, On the need for multipermutations: Cryptanalysis of MD4 and SAFER, Fast Software Encryption (B. Preneel, ed.), LNCS, Springer-Verlag, 1008 (1995) pp. 286-297.
-
(1995)
Fast Software Encryption
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
22
-
-
0346227894
-
On the design of linear transformations for substitution permutation encryption networks
-
Ottawa, August 11-12
-
A. M. Youssef, S. Mister and S. E. Tavares, On the design of linear transformations for substitution permutation encryption networks, Records of the Workshop on Selected Areas in Cryptography (SAC '97), Ottawa, August 11-12, 1997, pp. 40-48.
-
(1997)
Records of the Workshop on Selected Areas in Cryptography (SAC '97)
, pp. 40-48
-
-
Youssef, A.M.1
Mister, S.2
Tavares, S.E.3
|