메뉴 건너뛰기




Volumn 3357, Issue , 2004, Pages 114-129

FOX: A New Family of Block Ciphers

Author keywords

Block ciphers; Lai Massey scheme

Indexed keywords

CRYPTOGRAPHY; SCHEDULING ALGORITHMS; SECURITY OF DATA; ALGORITHMS; INTEGRAL EQUATIONS; LINEAR SYSTEMS; SCHEDULING;

EID: 24144444705     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30564-4_8     Document Type: Article
Times cited : (92)

References (33)
  • 1
    • 2942690967 scopus 로고    scopus 로고
    • AES Homepage, http://csrc.nist.gov/encryption/aes/.
    • AES Homepage
  • 2
    • 84958748914 scopus 로고    scopus 로고
    • In how many ways can you write Rijndael?
    • Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
    • E. Barkan and E. Biham. In how many ways can you write Rijndael? In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 160-175. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 160-175
    • Barkan, E.1    Biham, E.2
  • 3
    • 84957634424 scopus 로고    scopus 로고
    • Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
    • J. Stern, editor, Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
    • E. Biham, A. Biryukov, and A. Shamir. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In J. Stern, editor, Advances in Cryptology - EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 12-23. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 12-23
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 4
    • 84958778154 scopus 로고    scopus 로고
    • Enhancing differential-linear cryptanalysis
    • Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
    • E. Biham, O. Dunkelman, and N. Keller. Enhancing differential-linear cryptanalysis. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 254-266. Springer-Verlag.
    • Lecture Notes in Computer Science , vol.2501 , pp. 254-266
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 5
    • 84945132264 scopus 로고    scopus 로고
    • The rectangle attack - Rectangling the Serpent
    • B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT'01, Springer-Verlag
    • E. Biham, O. Dunkelman, and N. Keller. The rectangle attack - rectangling the Serpent. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT'01, volume 2045 of Lecture Notes in Computer Science, pages 340-357. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 340-357
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 6
    • 84957610784 scopus 로고    scopus 로고
    • Slide attacks
    • L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, Springer-Verlag
    • A. Biryukov and D. Wagner. Slide attacks. In L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, volume 1636 of Lecture Notes in Computer Science, pages 245-259. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 245-259
    • Biryukov, A.1    Wagner, D.2
  • 7
    • 84948988609 scopus 로고    scopus 로고
    • Advanced slide attacks
    • B. Preneel, editor, Advances in Cryptology - EUROCRYPT'00, Springer-Verlag
    • A. Biryukov and D. Wagner. Advanced slide attacks. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT'00, volume 1807 of Lecture Notes in Computer Science, pages 589-606. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 8
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
    • N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 267-287. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 9
    • 0001820140 scopus 로고
    • Cryptography and data security
    • H. Feistel. Cryptography and data security. Scientific American, 228(5):15-23, 1973.
    • (1973) Scientific American , vol.228 , Issue.5 , pp. 15-23
    • Feistel, H.1
  • 10
    • 84949194630 scopus 로고    scopus 로고
    • A simple algebraic representation of Rijndael
    • S. Vaudenay and A. Youssef, editors, Selected Areas in Cryptography: SAC 2001, Springer-Verlag
    • N. Ferguson, R. Schroeppel, and D. Whiting. A simple algebraic representation of Rijndael. In S. Vaudenay and A. Youssef, editors, Selected Areas in Cryptography: SAC 2001, volume 2259 of Lecture Notes in Computer Science, pages 103-111. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 103-111
    • Ferguson, N.1    Schroeppel, R.2    Whiting, D.3
  • 11
    • 84947942693 scopus 로고    scopus 로고
    • Partitioning cryptanalysis
    • E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
    • C. Harpes and J. Massey. Partitioning cryptanalysis. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 13-27. Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1267 , pp. 13-27
    • Harpes, C.1    Massey, J.2
  • 12
    • 84974712857 scopus 로고    scopus 로고
    • Provable security against differential and linear cryptanalysis for the SPN structure
    • B. Schneier, editor, Fast Software Encryption: 7th International Workshop, FSE 2000, Springer-Verlag
    • S. Hong, S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho. Provable security against differential and linear cryptanalysis for the SPN structure. In B. Schneier, editor, Fast Software Encryption: 7th International Workshop, FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 273-283. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 273-283
    • Hong, S.1    Lee, S.2    Lim, J.3    Sung, J.4    Cheon, D.5    Cho, I.6
  • 13
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack against block ciphers
    • E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
    • T. Jakobsen and L. Knudsen. The interpolation attack against block ciphers. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 28-40. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.2
  • 15
    • 33645599096 scopus 로고    scopus 로고
    • Perfect diffusion primitives for block ciphers - Building efficient MDS matrices
    • Springer-Verlag
    • P. Junod and S. Vaudenay. Perfect diffusion primitives for block ciphers - building efficient MDS matrices. In Proceedings of SAC'04. Springer-Verlag, 2004.
    • (2004) Proceedings of SAC'04
    • Junod, P.1    Vaudenay, S.2
  • 16
    • 84948949623 scopus 로고
    • Truncated and higher order differentials
    • B. Preneel, editor, Fast Software Encryption: Second International Workshop, Springer-Verlag
    • L. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption: Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 196-211. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 196-211
    • Knudsen, L.1
  • 17
    • 77949459994 scopus 로고    scopus 로고
    • Integral cryptanalysis
    • J. Daemen and V. Rijmen, editors, Fast Software Encryption: 9th International Workshop, FSE 2002, Springer-Verlag
    • L. Knudsen and D. Wagner. Integral cryptanalysis (extended abstract). In J. Daemen and V. Rijmen, editors, Fast Software Encryption: 9th International Workshop, FSE 2002, volume 2365 of Lecture Notes in Computer Science, pages 112-127. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2365 , pp. 112-127
    • Knudsen, L.1    Wagner, D.2
  • 18
    • 0003288228 scopus 로고
    • On the design and security of block ciphers
    • Hartung-Gorre Verlag
    • X. Lai. On the design and security of block ciphers, volume 1 of ETH Series in Information Processing. Hartung-Gorre Verlag, 1992.
    • (1992) ETH Series in Information Processing , vol.1
    • Lai, X.1
  • 19
    • 85011105685 scopus 로고
    • A proposal for a new block encryption standard
    • I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, Springer-Verlag
    • X. Lai and J. Massey. A proposal for a new block encryption standard. In I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, volume 473 of Lecture Notes in Computer Science, pages 389-404. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 389-404
    • Lai, X.1    Massey, J.2
  • 20
    • 1642575733 scopus 로고
    • Differential-linear cryptanalysis
    • Y. Desmedt, editor, Advances in Cryptology - CRYPTO'94, Springer-Verlag
    • K. Langford and E. Hellman. Differential-linear cryptanalysis. In Y. Desmedt, editor, Advances in Cryptology - CRYPTO'94, volume 839 of Lecture Notes in Computer Science, pages 17-25. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 17-25
    • Langford, K.1    Hellman, E.2
  • 21
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 22
    • 0347585053 scopus 로고    scopus 로고
    • New block encryption algorithm MISTY
    • E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
    • M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 53-67. Springer-Verlag.
    • Lecture Notes in Computer Science , vol.1267 , pp. 53-67
    • Matsui, M.1
  • 24
    • 0345058961 scopus 로고    scopus 로고
    • A new attack against Khazad
    • C. Laih, editor, Advances in Cryptology - ASIACRYPT'03, Springer-Verlag
    • F. Muller. A new attack against Khazad. In C. Laih, editor, Advances in Cryptology - ASIACRYPT'03, volume 2894 of Lecture Notes in Computer Science, pages 347-358. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 347-358
    • Muller, F.1
  • 25
    • 84937413721 scopus 로고    scopus 로고
    • Essential algebraic structure within the AES
    • M. Yung, editor, Advances in Cryptology - CRYPTO'02, Springer-Verlag
    • S. Murphy and M. Robshaw. Essential algebraic structure within the AES. In M. Yung, editor, Advances in Cryptology - CRYPTO'02, volume 2442 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 1-16
    • Murphy, S.1    Robshaw, M.2
  • 26
    • 0037426995 scopus 로고    scopus 로고
    • Comments on the security of the AES and the XSL technique
    • S. Murphy and M. Robshaw. Comments on the security of the AES and the XSL technique. Electronic Letters, 39(1):36-38. 2003.
    • (2003) Electronic Letters , vol.39 , Issue.1 , pp. 36-38
    • Murphy, S.1    Robshaw, M.2
  • 27
  • 28
    • 84948980739 scopus 로고
    • Black box cryptanalysis of hash networks based on multipermutations
    • A. De Santis, editor, Advances in Cryptology - EUROCRYPT'94, Springer-Verlag
    • C. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In A. De Santis, editor, Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science, pages 47-57. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 47-57
    • Schnorr, C.1    Vaudenay, S.2
  • 29
    • 84948973102 scopus 로고
    • On the need for multipermutations: Cryptanalysis of MD4 and SAFER
    • B. Preneel, editor, Fast Software Encryption: Second International Workshop, Springer-Verlag
    • S. Vaudenay. On the need for multipermutations: cryptanalysis of MD4 and SAFER. In B. Preneel, editor, Fast Software Encryption: Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 286-297. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 30
    • 21144439546 scopus 로고    scopus 로고
    • On the Lai-Massey scheme
    • K. Lam, T. Okamoto, and C. Xing, editors, Advances in Cryptology - ASIACRYPT'99, Springer-Verlag
    • S. Vaudenay. On the Lai-Massey scheme. In K. Lam, T. Okamoto, and C. Xing, editors, Advances in Cryptology - ASIACRYPT'99, volume 1716 of Lecture Notes in Computer Science, pages 8-19. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1716 , pp. 8-19
    • Vaudenay, S.1
  • 31
    • 21144435120 scopus 로고    scopus 로고
    • Decorrelation: A theory for block cipher security
    • S. Vaudenay. Decorrelation: a theory for block cipher security. Journal of Cryptology, 16(4):249-286, 2003.
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 249-286
    • Vaudenay, S.1
  • 32
    • 84945126868 scopus 로고    scopus 로고
    • The boomerang attack
    • L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, Springer-Verlag
    • D. Wagner. The boomerang attack. In L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, volume 1636 of Lecture Notes in Computer Science, pages 156-170. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 156-170
    • Wagner, D.1
  • 33
    • 84944065737 scopus 로고    scopus 로고
    • Related-cipher attacks
    • R. Deng, S. Qing, F. Bao, and J. Zhou, editors, Information and Communications Security: 4th International Conference, ICICS 2002, Springer-Verlag
    • H. Wu. Related-cipher attacks. In R. Deng, S. Qing, F. Bao, and J. Zhou, editors, Information and Communications Security: 4th International Conference, ICICS 2002, volume 2513 of Lecture Notes in Computer Science, pages 447-455. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2513 , pp. 447-455
    • Wu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.