메뉴 건너뛰기




Volumn 2288, Issue , 2002, Pages 103-113

Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

Author keywords

Concrete Security; Modes of Operation; Pseudorandom Function Family; Symmetric Encryption Schemes

Indexed keywords

CHROMIUM COMPOUNDS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 24944503795     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45861-1_9     Document Type: Conference Paper
Times cited : (6)

References (12)
  • 2
    • 84983089516 scopus 로고
    • The Security of the Cipher Block Chaining Message Authentication Code
    • Springer-Verlag
    • M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Advanced in Cryptology - CRYPTO’94, LNCS 839, pp. 341–358, Springer-Verlag, 1994.
    • (1994) Advanced in Cryptology - CRYPTO’94, LNCS , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 84903595110 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Springer-Verlag
    • E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology - CRYPTO’90, LNCS 537, pp. 2–21, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology - CRYPTO’90, LNCS , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 4
    • 84957677472 scopus 로고
    • Differential cryptanalysis of the full 16-round DES
    • Springer-Verlag
    • E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology - CRYPTO’92, LNCS 740, pp. 487–496, Springer-Verlag, 1992.
    • (1992) Advances in Cryptology - CRYPTO’92, LNCS , vol.740 , pp. 487-496
    • Biham, E.1    Shamir, A.2
  • 5
    • 0002540510 scopus 로고    scopus 로고
    • The Block Cipher Square, Fast Software Encryption
    • 1997
    • J. Daeman, L. Knudsen, and V. Rijmen, The Block Cipher Square, Fast Software Encryption 1997, LNCS 1636, pp. 46–59, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1636 , pp. 46-59
    • Daeman, J.1    Knudsen, L.2    Rijmen, V.3
  • 6
    • 0018443381 scopus 로고
    • Privacy and Authentication: An introduction to Cryptography
    • W. Diffie and M. Hellman, Privacy and Authentication: An introduction to Cryptography, Proceedings of the IEEE, 67(1979), pp. 397–427, 1979.
    • (1979) Proceedings of the IEEE , vol.67 , Issue.1979 , pp. 397-427
    • Diffie, W.1    Hellman, M.2
  • 8
    • 0005663765 scopus 로고    scopus 로고
    • The Saturation Attack - a Bait for Twofish
    • Stefan Lucks, The Saturation Attack - a Bait for Twofish, Fast Software Encrption 2001, 2001, to appear.
    • Fast Software Encrption 2001
    • Lucks, S.1
  • 9
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Springer-Verlag
    • M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology - EUROCRYPT’93, LNCS 765, pp. 386–397, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT’93, LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 10
    • 85028754650 scopus 로고
    • The first experimental cryptanalysis of the Data Encryption Standard
    • Springer-Verlag
    • M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology - CRYPTO’94, LNCS 839, pp. 1–11, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - CRYPTO’94, LNCS , vol.839 , pp. 1-11
    • Matsui, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.