-
1
-
-
2942690967
-
-
AES Homepage, http://csrc.nist.gov/encryption/aes/.
-
AES Homepage
-
-
-
2
-
-
84958748914
-
In how many ways can you write Rijndael?
-
Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
-
E. Barkan and E. Biham. In how many ways can you write Rijndael? In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 160-175. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 160-175
-
-
Barkan, E.1
Biham, E.2
-
3
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
J. Stern, editor, Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
-
E. Biham, A. Biryukov, and A. Shamir. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In J. Stern, editor, Advances in Cryptology - EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 12-23. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84958778154
-
Enhancing differential-linear cryptanalysis
-
Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
-
E. Biham, O. Dunkelman, and N. Keller. Enhancing differential-linear cryptanalysis. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 254-266. Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.2501
, pp. 254-266
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
5
-
-
84945132264
-
The rectangle attack - Rectangling the Serpent
-
B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT'01, Springer-Verlag
-
E. Biham, O. Dunkelman, and N. Keller. The rectangle attack - rectangling the Serpent. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT'01, volume 2045 of Lecture Notes in Computer Science, pages 340-357. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 340-357
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
6
-
-
84957610784
-
Slide attacks
-
L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, Springer-Verlag
-
A. Biryukov and D. Wagner. Slide attacks. In L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, volume 1636 of Lecture Notes in Computer Science, pages 245-259. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
7
-
-
84948988609
-
Advanced slide attacks
-
B. Preneel, editor, Advances in Cryptology - EUROCRYPT'00, Springer-Verlag
-
A. Biryukov and D. Wagner. Advanced slide attacks. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT'00, volume 1807 of Lecture Notes in Computer Science, pages 589-606. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
8
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, Springer-Verlag
-
N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In Y. Zheng, editor, Advances in Cryptology - ASIACRYPT'02, volume 2501 of Lecture Notes in Computer Science, pages 267-287. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
9
-
-
0001820140
-
Cryptography and data security
-
H. Feistel. Cryptography and data security. Scientific American, 228(5):15-23, 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
10
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
S. Vaudenay and A. Youssef, editors, Selected Areas in Cryptography: SAC 2001, Springer-Verlag
-
N. Ferguson, R. Schroeppel, and D. Whiting. A simple algebraic representation of Rijndael. In S. Vaudenay and A. Youssef, editors, Selected Areas in Cryptography: SAC 2001, volume 2259 of Lecture Notes in Computer Science, pages 103-111. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2259
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
11
-
-
84947942693
-
Partitioning cryptanalysis
-
E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
-
C. Harpes and J. Massey. Partitioning cryptanalysis. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 13-27. Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.1267
, pp. 13-27
-
-
Harpes, C.1
Massey, J.2
-
12
-
-
84974712857
-
Provable security against differential and linear cryptanalysis for the SPN structure
-
B. Schneier, editor, Fast Software Encryption: 7th International Workshop, FSE 2000, Springer-Verlag
-
S. Hong, S. Lee, J. Lim, J. Sung, D. Cheon, and I. Cho. Provable security against differential and linear cryptanalysis for the SPN structure. In B. Schneier, editor, Fast Software Encryption: 7th International Workshop, FSE 2000, volume 1978 of Lecture Notes in Computer Science, pages 273-283. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 273-283
-
-
Hong, S.1
Lee, S.2
Lim, J.3
Sung, J.4
Cheon, D.5
Cho, I.6
-
13
-
-
84947929289
-
The interpolation attack against block ciphers
-
E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
-
T. Jakobsen and L. Knudsen. The interpolation attack against block ciphers. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 28-40. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.2
-
15
-
-
33645599096
-
Perfect diffusion primitives for block ciphers - Building efficient MDS matrices
-
Springer-Verlag
-
P. Junod and S. Vaudenay. Perfect diffusion primitives for block ciphers - building efficient MDS matrices. In Proceedings of SAC'04. Springer-Verlag, 2004.
-
(2004)
Proceedings of SAC'04
-
-
Junod, P.1
Vaudenay, S.2
-
16
-
-
84948949623
-
Truncated and higher order differentials
-
B. Preneel, editor, Fast Software Encryption: Second International Workshop, Springer-Verlag
-
L. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption: Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 196-211. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 196-211
-
-
Knudsen, L.1
-
17
-
-
77949459994
-
Integral cryptanalysis
-
J. Daemen and V. Rijmen, editors, Fast Software Encryption: 9th International Workshop, FSE 2002, Springer-Verlag
-
L. Knudsen and D. Wagner. Integral cryptanalysis (extended abstract). In J. Daemen and V. Rijmen, editors, Fast Software Encryption: 9th International Workshop, FSE 2002, volume 2365 of Lecture Notes in Computer Science, pages 112-127. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 112-127
-
-
Knudsen, L.1
Wagner, D.2
-
18
-
-
0003288228
-
On the design and security of block ciphers
-
Hartung-Gorre Verlag
-
X. Lai. On the design and security of block ciphers, volume 1 of ETH Series in Information Processing. Hartung-Gorre Verlag, 1992.
-
(1992)
ETH Series in Information Processing
, vol.1
-
-
Lai, X.1
-
19
-
-
85011105685
-
A proposal for a new block encryption standard
-
I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, Springer-Verlag
-
X. Lai and J. Massey. A proposal for a new block encryption standard. In I. Damgård, editor, Advances in Cryptology - EUROCRYPT'90, volume 473 of Lecture Notes in Computer Science, pages 389-404. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 389-404
-
-
Lai, X.1
Massey, J.2
-
20
-
-
1642575733
-
Differential-linear cryptanalysis
-
Y. Desmedt, editor, Advances in Cryptology - CRYPTO'94, Springer-Verlag
-
K. Langford and E. Hellman. Differential-linear cryptanalysis. In Y. Desmedt, editor, Advances in Cryptology - CRYPTO'94, volume 839 of Lecture Notes in Computer Science, pages 17-25. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 17-25
-
-
Langford, K.1
Hellman, E.2
-
21
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
22
-
-
0347585053
-
New block encryption algorithm MISTY
-
E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, Springer-Verlag
-
M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, FSE'97, volume 1267 of Lecture Notes in Computer Science, pages 53-67. Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.1267
, pp. 53-67
-
-
Matsui, M.1
-
24
-
-
0345058961
-
A new attack against Khazad
-
C. Laih, editor, Advances in Cryptology - ASIACRYPT'03, Springer-Verlag
-
F. Muller. A new attack against Khazad. In C. Laih, editor, Advances in Cryptology - ASIACRYPT'03, volume 2894 of Lecture Notes in Computer Science, pages 347-358. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 347-358
-
-
Muller, F.1
-
25
-
-
84937413721
-
Essential algebraic structure within the AES
-
M. Yung, editor, Advances in Cryptology - CRYPTO'02, Springer-Verlag
-
S. Murphy and M. Robshaw. Essential algebraic structure within the AES. In M. Yung, editor, Advances in Cryptology - CRYPTO'02, volume 2442 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 1-16
-
-
Murphy, S.1
Robshaw, M.2
-
26
-
-
0037426995
-
Comments on the security of the AES and the XSL technique
-
S. Murphy and M. Robshaw. Comments on the security of the AES and the XSL technique. Electronic Letters, 39(1):36-38. 2003.
-
(2003)
Electronic Letters
, vol.39
, Issue.1
, pp. 36-38
-
-
Murphy, S.1
Robshaw, M.2
-
28
-
-
84948980739
-
Black box cryptanalysis of hash networks based on multipermutations
-
A. De Santis, editor, Advances in Cryptology - EUROCRYPT'94, Springer-Verlag
-
C. Schnorr and S. Vaudenay. Black box cryptanalysis of hash networks based on multipermutations. In A. De Santis, editor, Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science, pages 47-57. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 47-57
-
-
Schnorr, C.1
Vaudenay, S.2
-
29
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
B. Preneel, editor, Fast Software Encryption: Second International Workshop, Springer-Verlag
-
S. Vaudenay. On the need for multipermutations: cryptanalysis of MD4 and SAFER. In B. Preneel, editor, Fast Software Encryption: Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 286-297. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
30
-
-
21144439546
-
On the Lai-Massey scheme
-
K. Lam, T. Okamoto, and C. Xing, editors, Advances in Cryptology - ASIACRYPT'99, Springer-Verlag
-
S. Vaudenay. On the Lai-Massey scheme. In K. Lam, T. Okamoto, and C. Xing, editors, Advances in Cryptology - ASIACRYPT'99, volume 1716 of Lecture Notes in Computer Science, pages 8-19. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1716
, pp. 8-19
-
-
Vaudenay, S.1
-
31
-
-
21144435120
-
Decorrelation: A theory for block cipher security
-
S. Vaudenay. Decorrelation: a theory for block cipher security. Journal of Cryptology, 16(4):249-286, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 249-286
-
-
Vaudenay, S.1
-
32
-
-
84945126868
-
The boomerang attack
-
L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, Springer-Verlag
-
D. Wagner. The boomerang attack. In L. Knudsen, editor, Fast Software Encryption: 6th International Workshop, FSE'99, volume 1636 of Lecture Notes in Computer Science, pages 156-170. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 156-170
-
-
Wagner, D.1
-
33
-
-
84944065737
-
Related-cipher attacks
-
R. Deng, S. Qing, F. Bao, and J. Zhou, editors, Information and Communications Security: 4th International Conference, ICICS 2002, Springer-Verlag
-
H. Wu. Related-cipher attacks. In R. Deng, S. Qing, F. Bao, and J. Zhou, editors, Information and Communications Security: 4th International Conference, ICICS 2002, volume 2513 of Lecture Notes in Computer Science, pages 447-455. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 447-455
-
-
Wu, H.1
|