-
1
-
-
0031351741
-
A Concrete Security Treetment of Symmetric Encryption: Analysis of the DES Modes of Operation
-
The revised version
-
M. Bellare, A. Desai, E. JokiPii, and P. Rogaway, A Concrete Security Treetment of Symmetric Encryption: Analysis of the DES Modes of Operation, Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. The revised version is available at http://www-cse.ucsd.edu/users/mihir.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
2
-
-
84983089516
-
The Security of the Cipher Block Chaining Message Authentication Code
-
Springer-Verlag
-
M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Advanced in Cryptology - CRYPTO’94, LNCS 839, pp. 341–358, Springer-Verlag, 1994.
-
(1994)
Advanced in Cryptology - CRYPTO’94, LNCS
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
Springer-Verlag
-
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Advances in Cryptology - CRYPTO’90, LNCS 537, pp. 2–21, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - CRYPTO’90, LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
84957677472
-
Differential cryptanalysis of the full 16-round DES
-
Springer-Verlag
-
E. Biham and A. Shamir, Differential cryptanalysis of the full 16-round DES, Advances in Cryptology - CRYPTO’92, LNCS 740, pp. 487–496, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology - CRYPTO’92, LNCS
, vol.740
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
0002540510
-
The Block Cipher Square, Fast Software Encryption
-
1997
-
J. Daeman, L. Knudsen, and V. Rijmen, The Block Cipher Square, Fast Software Encryption 1997, LNCS 1636, pp. 46–59, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1636
, pp. 46-59
-
-
Daeman, J.1
Knudsen, L.2
Rijmen, V.3
-
6
-
-
0018443381
-
Privacy and Authentication: An introduction to Cryptography
-
W. Diffie and M. Hellman, Privacy and Authentication: An introduction to Cryptography, Proceedings of the IEEE, 67(1979), pp. 397–427, 1979.
-
(1979)
Proceedings of the IEEE
, vol.67
, Issue.1979
, pp. 397-427
-
-
Diffie, W.1
Hellman, M.2
-
8
-
-
0005663765
-
The Saturation Attack - a Bait for Twofish
-
Stefan Lucks, The Saturation Attack - a Bait for Twofish, Fast Software Encrption 2001, 2001, to appear.
-
Fast Software Encrption 2001
-
-
Lucks, S.1
-
9
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Springer-Verlag
-
M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology - EUROCRYPT’93, LNCS 765, pp. 386–397, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT’93, LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
10
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
Springer-Verlag
-
M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology - CRYPTO’94, LNCS 839, pp. 1–11, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO’94, LNCS
, vol.839
, pp. 1-11
-
-
Matsui, M.1
-
11
-
-
84949955153
-
-
U.S. Department of Commerce, Washington D.C., December
-
National Bureau of Standards, DES modes of operation, FIPS-Pub.46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., December 1980.
-
(1980)
DES Modes of Operation, Fips-Pub.46, National Bureau of Standards
-
-
|