메뉴 건너뛰기




Volumn 22, Issue 1, 2001, Pages 65-87

Linear Frameworks for Block Ciphers

Author keywords

Block ciphers; MDS codes; Rijndael; Substitution linear transformation networks

Indexed keywords


EID: 0348238301     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1008303310011     Document Type: Article
Times cited : (10)

References (22)
  • 2
    • 84948980795 scopus 로고
    • Correlation matrices
    • B. Preneel, ed., LNCS, Springer-Verlag
    • J. Daemen, R. Govaerts and J. Vandewalle, Correlation matrices, Fast Software Encryption (B. Preneel, ed.), LNCS, Springer-Verlag, 1008 (1995) pp. 275-285.
    • (1995) Fast Software Encryption , vol.1008 , pp. 275-285
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 4
    • 84947444236 scopus 로고    scopus 로고
    • The block cipher Square
    • (E. Biham, ed.), LNCS, Springer-Verlag
    • J. Daemen, L. Knudsen, V. Rijmen, The block cipher Square, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 149-165.
    • (1997) Fast Software Encryption , vol.1267 , pp. 149-165
    • Daemen, J.1    Knudsen, L.2    Rijmen, V.3
  • 6
    • 84947913977 scopus 로고    scopus 로고
    • TWOPRIME: A fast stream ciphering algorithm
    • (E. Biham, ed.), LNCS, Springer-Verlag
    • C. Ding, V. Niemi, A. Renvall and A. Salomaa, TWOPRIME: a fast stream ciphering algorithm, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 88-102.
    • (1997) Fast Software Encryption , vol.1267 , pp. 88-102
    • Ding, C.1    Niemi, V.2    Renvall, A.3    Salomaa, A.4
  • 7
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • May
    • H. Feistel, Cryptography and computer privacy, Scientific American, Vol. 228, No. 5 (May 1973) pp. 15-23.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 8
    • 0003099980 scopus 로고    scopus 로고
    • Substitution-permutation networks resistant to differential and linear cryptanalysis
    • H. M. Heys and S. E. Tavares, Substitution-permutation networks resistant to differential and linear cryptanalysis, Journal of Cryptology, Vol. 9, No. 1, (1996), pp. 1-20.
    • (1996) Journal of Cryptology , vol.9 , Issue.1 , pp. 1-20
    • Heys, H.M.1    Tavares, S.E.2
  • 9
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack on block ciphers
    • E. Biham, ed., LNCS, Springer-Verlag
    • T. Jakobsen and L. R. Knudsen, The interpolation attack on block ciphers, Fast Software Encryption (E. Biham, ed.), LNCS, Springer-Verlag, 1267 (1997) pp. 28-40.
    • (1997) Fast Software Encryption , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 10
    • 0346858443 scopus 로고
    • A recursive construction method of S-boxes satisfying strict avalanche criterion
    • S. Vanstone, ed., LNCS, Springer-Verlag
    • K. Kim, T. Matsumoto and H. Imai, A recursive construction method of S-boxes satisfying strict avalanche criterion, Advances in Cryptology, Proc. Crypto '90 (S. Vanstone, ed.), LNCS, Springer-Verlag, 537 (1991) pp. 564-575.
    • (1991) Advances in Cryptology, Proc. Crypto '90 , vol.537 , pp. 564-575
    • Kim, K.1    Matsumoto, T.2    Imai, H.3
  • 11
    • 85028910917 scopus 로고
    • Markov ciphers and differential cryptanalysis
    • D. W. Davies, ed., LNCS, Springer-Verlag
    • X. Lai, J. L. Massey and S. Murphy, Markov ciphers and differential cryptanalysis, Advances in Cryptology, Proceedings Eurocrypt '91 (D. W. Davies, ed.), LNCS, Springer-Verlag, 547 (1991) pp. 17-38.
    • (1991) Advances in Cryptology, Proceedings Eurocrypt '91 , vol.547 , pp. 17-38
    • Lai, X.1    Massey, J.L.2    Murphy, S.3
  • 14
    • 85019318892 scopus 로고
    • SAFER-K64, a byte-oriented block-ciphering algorithm
    • (R. Anderson, ed.), LNCS, Springer-Verlag
    • J. Massey, SAFER-K64, a byte-oriented block-ciphering algorithm, Fast Software Encryption (R. Anderson, ed.), LNCS, Springer-Verlag, 809 (1994) pp. 1-17.
    • (1994) Fast Software Encryption , vol.809 , pp. 1-17
    • Massey, J.1
  • 16
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • (T. Helleseth, ed.), LNCS, Springer-Verlag
    • M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology, Proceedings Eurocrypt '93 (T. Helleseth, ed.), LNCS, Springer-Verlag, 765 (1994) pp. 386-397.
    • (1994) Advances in Cryptology, Proceedings Eurocrypt '93 , vol.765 , pp. 386-397
    • Matsui, M.1
  • 17
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • (T. Helleseth, ed.), LNCS, Springer-Verlag
    • K. Nyberg, Differentially uniform mappings for cryptography, Advances in Cryptology, Proc. Eurocrypt' 93 (T. Helleseth, ed.), LNCS, Springer-Verlag, 765 (1994) pp. 55-64.
    • (1994) Advances in Cryptology, Proc. Eurocrypt' 93 , vol.765 , pp. 55-64
    • Nyberg, K.1
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, No. 30 (1949) pp. 50-64.
    • (1949) Bell System Technical Journal , Issue.30 , pp. 50-64
    • Shannon, C.E.1
  • 20
    • 0348119054 scopus 로고    scopus 로고
    • On the avalanche characteristics of substitution permutation networks
    • (J. Pfibyl, ed.), CTU Publishing House, Prague
    • S. Tavares and A. M. Youssef, On the avalanche characteristics of substitution permutation networks, Proceedings of Pragocrypt '96 (J. Pfibyl, ed.), CTU Publishing House, Prague (1996) pp. 18-29.
    • (1996) Proceedings of Pragocrypt '96 , pp. 18-29
    • Tavares, S.1    Youssef, A.M.2
  • 21
    • 84948973102 scopus 로고
    • On the need for multipermutations: Cryptanalysis of MD4 and SAFER
    • (B. Preneel, ed.), LNCS, Springer-Verlag
    • S. Vaudenay, On the need for multipermutations: Cryptanalysis of MD4 and SAFER, Fast Software Encryption (B. Preneel, ed.), LNCS, Springer-Verlag, 1008 (1995) pp. 286-297.
    • (1995) Fast Software Encryption , vol.1008 , pp. 286-297
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.