-
2
-
-
26444452832
-
Gröbner bases algorithm
-
February
-
I. A. Ajwa, Z. Liu, P. S. Wang, "Gröbner Bases Algorithm," ICM Technical Report, February 1995, Available Online at http://icm.mcs.kent. edu/reports/1995/gb.pdf.
-
(1995)
ICM Technical Report
-
-
Ajwa, I.A.1
Liu, Z.2
Wang, P.S.3
-
3
-
-
85048616277
-
32 with applications to MD5
-
Eurocrypt 1992 (R. A. Rueppel, ed.), Springer-Verlag
-
32 with Applications to MD5," Eurocrypt 1992 (R. A. Rueppel, ed.), vol. 658 of LNCS, pp. 71-80, Springer-Verlag, 1993.
-
(1993)
LNCS
, vol.658
, pp. 71-80
-
-
Berson, T.A.1
-
4
-
-
0346494239
-
-
June
-
C. Burwick, D. Coppersmith, E. D'Avignon, Y. Gennaro, S. Halevi, C. Jutla, S. M. Matyas Jr., L. O'Connor, M. Peyravian, D. Safford and N. Zunic, "MARS - A Candidate Cipher for AES," Available Online at http://www.research.ibm.com/security/mars.html, June 1998.
-
(1998)
MARS - A Candidate Cipher for AES
-
-
Burwick, C.1
Coppersmith, D.2
D'Avignon, E.3
Gennaro, Y.4
Halevi, S.5
Jutla, C.6
Matyas Jr., S.M.7
O'Connor, L.8
Peyravian, M.9
Safford, D.10
Zunic, N.11
-
5
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
Crypto'90 (A. Menezes, S. A. Vanstone, eds.), Springer-Verlag
-
E. Biham, A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Crypto'90 (A. Menezes, S. A. Vanstone, eds.), vol. 537 of LNCS, pp. 2-21, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
9
-
-
0242571721
-
Helix: Fast encryption and authentication in a single cryptographic primitive
-
Fast Software Encryption 2003 (T. Johansson, ed.), Springer-Verlag
-
N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, T. Kohno, "Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive," Fast Software Encryption 2003 (T. Johansson, ed.), vol. 2887 of LNCS, pp. 330-346, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
10
-
-
0003620778
-
-
Pearson Education
-
J. E. Hopcroft, R. Motwani, J. D. Ullman, "Introduction to Automata Theory, Languages and Computation," Second Edition, Pearson Education, 2004.
-
(2004)
"Introduction to Automata Theory, Languages and Computation," Second Edition
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
11
-
-
35048887028
-
Cryptographic applications of T-functions
-
Selected Areas in Cryptography 2003 (M. Matsui, R. J. Zuccherato, eds.), Springer-Verlag
-
A. Klimov, A. Shamir, "Cryptographic Applications of T-Functions," Selected Areas in Cryptography 2003 (M. Matsui, R. J. Zuccherato, eds.), vol. 3006 of LNCS, pp. 248-261, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3006
, pp. 248-261
-
-
Klimov, A.1
Shamir, A.2
-
12
-
-
35048827901
-
New cryptographic primitives based on multiword T-functions
-
Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), Springer-Verlag
-
A. Klimov, A. Shamir, "New Cryptographic Primitives Based on Multiword T-Functions," Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), vol. 3017 of LNCS, pp. 1-15, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3017
, pp. 1-15
-
-
Klimov, A.1
Shamir, A.2
-
13
-
-
84957060922
-
Cryptanalysis of the HFE public key cryptosystems by relinearization
-
Crypto 1999 (M. Wiener, ed.), Springer-Verlag
-
A. Kipnis, A. Shamir, "Cryptanalysis of the HFE Public Key Cryptosystems by Relinearization," Crypto 1999 (M. Wiener, ed.), vol. 1666 of LNCS, pp. 19-30, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 19-30
-
-
Kipnis, A.1
Shamir, A.2
-
14
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
Eurocrypt'91 (W. Davis, ed.), Springer-Verlag
-
X. Lai, J. L. Massey, S. Murphy, "Markov Ciphers and Differential Cryptanalysis," Eurocrypt'91 (W. Davis, ed.), vol. 547 of LNCS, pp. 17-38, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.547
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
15
-
-
84958984270
-
Efficient algorithms for computing differential properties of addition
-
FSE 2001 (M. Matsui, ed.), Springer-Verlag
-
H. Lipmaa, S. Moriai, "Efficient Algorithms for Computing Differential Properties of Addition," FSE 2001 (M. Matsui, ed.), vol. 2355 of LNCS, pp. 336-350, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2355
, pp. 336-350
-
-
Lipmaa, H.1
Moriai, S.2
-
16
-
-
35048827899
-
On the additive differential probability of exclusive-or
-
Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), Springer-Verlag
-
L. Lipmaa, J. Wallen, P. Dumas, "On the Additive Differential Probability of Exclusive-Or," Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), vol. 3017 of LNCS, pp. 317-331, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3017
, pp. 317-331
-
-
Lipmaa, L.1
Wallen, J.2
Dumas, P.3
-
17
-
-
26444613466
-
Differential attacks against the helix stream cipher
-
Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), Springer-Verlag
-
F. Muller, "Differential Attacks against the Helix Stream Cipher," Fast Software Encryption 2004 (B. Roy, W. Meier, eds.), vol. 3017 of LNCS, pp. 94-108, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3017
, pp. 94-108
-
-
Muller, F.1
-
18
-
-
0029632010
-
Provable security against a differential attack
-
K. Nyberg, L. Knudsen, "Provable Security Against a Differential Attack," Journal of Cryptology, 8(1):27-37, 1991.
-
(1991)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.2
-
19
-
-
26444481230
-
Solving systems of differential equations of addition
-
S. Paul, B. Preneel, "Solving Systems of Differential Equations of Addition," Cryptology ePrint Archive, Report 2004/294, Available Online at http://eprint.iacr.org/2004/294, 2004.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.294
-
-
Paul, S.1
Preneel, B.2
-
20
-
-
0004102023
-
-
June
-
R. L. Rivest, M. Robshaw, R. Sidney, Y. L. Yin, "The RC6 Block Cipher," Available Online at http://theory.lcs.mit.edu/rivest/rc6.ps, June 1998.
-
(1998)
The RC6 Block Cipher
-
-
Rivest, R.L.1
Robshaw, M.2
Sidney, R.3
Yin, Y.L.4
-
21
-
-
0006686739
-
-
John Wiley & Sons, April ISBN: 0471353817
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C.Hall, N. Ferguson, "The Twofish Encryption Algorithm: A 128-Bit Block Cipher," John Wiley & Sons, April 1999, ISBN: 0471353817.
-
(1999)
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
22
-
-
85016817758
-
Cryptographic significance of the carry for ciphers based on integer addition
-
Crypto'90 (A. Menezes, S. A. Vanstone, eds.), Springer-Verlag
-
O. Staffelbach, W. Meier, "Cryptographic Significance of the Carry for Ciphers Based on Integer Addition," Crypto'90 (A. Menezes, S. A. Vanstone, eds.), vol. 537 of LNCS, pp. 601-614, Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.537
, pp. 601-614
-
-
Staffelbach, O.1
Meier, W.2
-
23
-
-
23944465520
-
Non-randomness of the full 4 and 5-pass HAVAL
-
SCN 2004 (Carlo Blundo and Stelvio Cimato, eds.), Springer-Verlag
-
H. Yoshida, A. Biryukov, Christophe De Cannière, J. Lano, B. Preneel, "Non-randomness of the Full 4 and 5-Pass HAVAL," SCN 2004 (Carlo Blundo and Stelvio Cimato, eds.), vol. 3352 of LNCS, pp. 324-336, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3352
, pp. 324-336
-
-
Yoshida, H.1
Biryukov, A.2
De Cannière, C.3
Lano, J.4
Preneel, B.5
-
24
-
-
0242487611
-
n
-
Fast Software Encryption 2003 (T. Johansson, ed.), Springer-Verlag
-
n," Fast Software Encryption 2003 (T. Johansson, ed.), vol. 2887 of LNCS, pp. 261-273, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2887
, pp. 261-273
-
-
Wallen, J.1
|