-
1
-
-
0012022902
-
Specification of Camellia-a 128-bit Block Cipher
-
Springer-Verlag
-
K.Aoki,T.Ichikawa,M.Kanda,M.Matsui,S.Moriai,J.Nakajima and T.Tokita, "Specification of Camellia-a 128-bit Block Cipher," Selected Areas in Cryptography - SAC'2000, Springer-Verlag 2000,pp. 183-191.
-
(2000)
Selected Areas in Cryptography - SAC'2000
, pp. 183-191
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
2
-
-
85062143142
-
-
http://www.cryptonessie.org
-
-
-
-
4
-
-
33645589195
-
Higher order differential attack of Camellia(II)
-
Springer-Verlag
-
Y.Hatano,H.Sekine, and T.Kaneko, "Higher order differential attack of Camellia(II),"Selected Areas in Cryptography-S'AC'02, LNCS 2595,Springer-Verlag 2002, pp.39-56.
-
(2002)
Selected Areas in Cryptography-S'AC'02, LNCS
, vol.2595
, pp. 39-56
-
-
Hatano, Y.1
Sekine, H.2
Kaneko, T.3
-
5
-
-
84949951043
-
Truncated Differential Cryptanalysis of Camellia
-
SpringerVerlag
-
S. Lee, S. Hong, S. Lee, J. Lim and S. Yoon, "Truncated Differential Cryptanalysis of Camellia", Information Security and Cryptology-ICISC'01, LNCS 2288, SpringerVerlag,2001,pp.32-38.
-
(2001)
Information Security and Cryptology-ICISC'01,LNCS
, vol.2288
, pp. 32-38
-
-
Lee, S.1
Hong, S.2
Lee, S.3
Lim, J.4
Yoon, S.5
-
6
-
-
84946831143
-
Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis
-
Springer-Verlag
-
M.Sugita,K.Kobara, and H.Imai, "Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis," Advances in Cryptology- Asiacrypt'01,LNCS 2248,Springer-Verlag 2001, pp.193-207.
-
(2001)
Advances in Cryptology- Asiacrypt'01,LNCS
, vol.2248
, pp. 193-207
-
-
Sugita, M.1
Kobara, K.2
Imai, H.3
-
7
-
-
84949469334
-
Improved upper bounds of differential and linear characteristic probability for Camellia
-
Springer-Verlag
-
T.Shirai,S.Kanamaru,and G.Abe, "Improved upper bounds of differential and linear characteristic probability for Camellia," Fast Software EncryptionFSE'02,LNCS 2365,Springer-Verlag 2002,pp.128-142.
-
(2002)
Fast Software EncryptionFSE'02,LNCS
, vol.2365
, pp. 128-142
-
-
Shirai, T.1
Kanamaru, S.2
Abe, G.3
-
8
-
-
84957022995
-
Square attack on Reduced Camellia Cipher
-
Springer-Verlag
-
He Ye-ping and Qing Si-han, "Square attack on Reduced Camellia Cipher," Information and Communication Security-ICICS'01,U3CS 2229, Springer-Verlag 2001,pp.238-245.
-
(2001)
Information and Communication Security-ICICS'01,U3CS
, vol.2229
, pp. 238-245
-
-
Ye-ping, H.1
Si-han, Q.2
-
9
-
-
84949446672
-
On the security of Camellia against the square attack
-
Springer-Verlag
-
Y.Yeom, S.Park, and I. Kirn, "On the security of Camellia against the square attack," Fast Software Encryption-FSE'OS,LNCS 2356, Springer-Verlag 2002,pp.89-99.
-
(2002)
Fast Software Encryption-FSE'OS,LNCS
, vol.2356
, pp. 89-99
-
-
Yeom, Y.1
Park, S.2
Kirn, I.3
-
11
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff, " How to construct pseudorandom permutations from pseudorandom functions," SIAM Journal on Computing, Vol. 17,No.2,(1988),pp.373-386.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
12
-
-
24144461045
-
New results on pseudorandom permutation generators based on the des Scheme
-
Springer-Verlag
-
J.Patarin, " New results on pseudorandom permutation generators based on the DES Scheme," Advances in Cryptology-Crypto'91, Springer-Verlag 1991,pp.72-77.
-
(1991)
Advances in Cryptology-Crypto'91
, pp. 72-77
-
-
Patarin, J.1
-
13
-
-
85048564026
-
A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators
-
Springer-Verlag
-
U.M.Maurer, "A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators," Advances in Cryptology-Eurocrypt'92, LNCS 658,Springer-Verlag 1992,pp.239-255.
-
(1992)
Advances in Cryptology-Eurocrypt'92, LNCS
, vol.658
, pp. 239-255
-
-
Maurer, U.M.1
-
14
-
-
78649840429
-
Provable security for block ciphers by decorrelation
-
Springer-Verlag
-
S. Vaudenay, "Provable security for block ciphers by decorrelation," In Proc. of STACS'98, LNCS 1373, Springer-Verlag 1998,pp.249-275.
-
(1998)
Proc. of STACS'98, LNCS
, vol.1373
, pp. 249-275
-
-
Vaudenay, S.1
-
15
-
-
84974733692
-
On the Pseudorandomness of the AES Finalists-RC6 and Serpent
-
Springer-Verlag
-
T.Iwata and K. Kurosawa, "On the Pseudorandomness of the AES Finalists-RC6 and Serpent," Fast Software Encryption-FES'2000, LNCS 1978, Springer-Verlag 2000,pp.231-243,.
-
(2000)
Fast Software Encryption-FES'2000, LNCS
, vol.1978
, pp. 231-243
-
-
Iwata, T.1
Kurosawa, K.2
-
16
-
-
0003064824
-
On the construction of pseudorandom permutations Luby-Rackoff revisited
-
M.Naor and O.Reingold, "On the construction of pseudorandom permutations Luby-Rackoff revisited," Journal of Cryptology, Vol.12, No.l,pp.29-66,1999.
-
(1999)
Journal of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
|