-
3
-
-
84948955781
-
On Matsui's linear cryptanalysis
-
Advances in Cryptology, proceedings of EUROCRYPT '94, Springer-Verlag
-
Eli Biham, On Matsui's Linear Cryptanalysis, Advances in Cryptology, proceedings of EUROCRYPT '94, Lecture Notes in Computer Science 950, pp. 341-355, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 341-355
-
-
Biham, E.1
-
4
-
-
84947913669
-
Cryptanalysis of ladder-DES
-
proceedings of Fast Software Encryption 4, Springer-Verlag
-
Eli Biham, Cryptanalysis of Ladder-DES, proceedings of Fast Software Encryption 4, Lecture Notes in Computer Science 1267, pp. 134-138, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1267
, pp. 134-138
-
-
Biham, E.1
-
6
-
-
84957694360
-
Miss in the middle attacks on IDEA and khufu
-
proceedings of Fast Software Encryption 6, Springer-Verlag
-
Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA and Khufu, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 124-138, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 124-138
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
7
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
Advances in Cryptology, proceedings of EUROCRYPT '99, Springer-Verlag
-
Eli Biham, Alex Biryukov, Adi Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Advances in Cryptology, proceedings of EUROCRYPT '99, Lecture Notes in Computer Science 1592, pp. 12-23, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
8
-
-
84958778154
-
Enhanced differential-linear cryptanalysis
-
Advances in Cryptology, proceedings of ASIACRYPT '02, Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, Enhanced Differential-Linear Cryptanalysis, Advances in Cryptology, proceedings of ASIACRYPT '02, Lecture Notes in Computer Science 2501, pp. 254-266, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 254-266
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
9
-
-
0242404246
-
Differential-linear cryptanalysis of serpent
-
proceedings of Fast Software Encryption 10, Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, Differential-Linear Cryptanalysis of Serpent, proceedings of Fast Software Encryption 10, Lecture Notes in Computer Science 2887, pp. 9-21, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
, pp. 9-21
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
10
-
-
84957692171
-
From differential cryptoanalysis to ciphertext-only attacks
-
Advances in Cryptology, proceedings of CRYPTO '98, Springer-Verlag
-
Alex Biryukov, Eyal Kushilevitz, From Differential Cryptoanalysis to Ciphertext-Only Attacks, Advances in Cryptology, proceedings of CRYPTO '98, Lecture Notes in Computer Science 1462, pp. 72-88, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 72-88
-
-
Biryukov, A.1
Kushilevitz, E.2
-
11
-
-
84944029559
-
New weak-key classes of IDEA
-
proceedings of ICICS '02, Springer-Verlag
-
Alex Biryukov, Jorge Nakahara, Bart Preneel, Joos Vandewalle, New Weak-Key Classes of IDEA, proceedings of ICICS '02, Lecture Notes in Computer Science 2513, pp. 315-326, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 315-326
-
-
Biryukov, A.1
Nakahara, J.2
Preneel, B.3
Vandewalle, J.4
-
12
-
-
84945121465
-
Structural cryptanalysis of SASAS
-
Advances in Cryptology, proceedings of EUROCRYPT '01, Springer-Verlag
-
Alex Biryukov, Adi Shamir, Structural Cryptanalysis of SASAS, Advances in Cryptology, proceedings of EUROCRYPT '01, Lecture Notes in Computer Science 2045, pp. 394-405, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 394-405
-
-
Biryukov, A.1
Shamir, A.2
-
13
-
-
84957369098
-
Two attacks on reduced round IDEA
-
Advances in Cryptology, proceedings of EUROCRYPT '97, Springer-Verlag
-
Johan Borst, Lars R. Knudsen, Vincent Rijmen, Two Attacks on Reduced Round IDEA, Advances in Cryptology, proceedings of EUROCRYPT '97, Lecture Notes in Computer Science 1233, pp. 1-13, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 1-13
-
-
Borst, J.1
Knudsen, L.R.2
Rijmen, V.3
-
14
-
-
26444532237
-
Feistel schemes and bi-linear cryptanalysis
-
Advances in Cryptology, proceedings of CRYPTO '04, Springer-Verlag
-
Nicolas T. Courtois, Feistel Schemes and Bi-Linear Cryptanalysis, Advances in Cryptology, proceedings of CRYPTO '04, Lecture Notes in Computer Science 3152, pp. 23-40, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 23-40
-
-
Courtois, N.T.1
-
17
-
-
85025673016
-
Weak keys for IDEA
-
Advances in Cryptology, proceedings of CRYPTO '93, Springer-Verlag
-
Joan Daemen, René Govaerts, Joos Vandewalle, Weak Keys for IDEA, Advances in Cryptology, proceedings of CRYPTO '93, Lecture Notes in Computer Science 773, pp. 224-231, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
18
-
-
84947444236
-
The block cipher square
-
proceedings of Fast Software Encryption 4, Springer-Verlag
-
Joan Daemen, Lars R. Knudsen, Vincent Rijmen, The Block Cipher Square, proceedings of Fast Software Encryption 4, Lecture Notes in Computer Science 1267, pp. 149-165, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1267
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
19
-
-
84974678303
-
Improved cryptanalysis of rijndael
-
proceedings of Fast Software Encryption 7, Springer-Verlag
-
Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, Doug Whiting, Improved Cryptanalysis of Rijndael, proceedings of Fast Software Encryption 7, Lecture Notes in Computer Science 1978, pp. 213-230, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
20
-
-
84957688406
-
Differential-linear weak keys classes of IDEA
-
Advances in Cryptology, proceedings if EUROCRYPT '98, Springer-Verlag
-
Philip Hawkes, Differential-Linear Weak Keys Classes of IDEA, Advances in Cryptology, proceedings if EUROCRYPT '98, Lecture Notes in Computer Science 1403, pp. 112-126, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 112-126
-
-
Hawkes, P.1
-
21
-
-
21644486305
-
How to strengthen des against two robust attacks
-
Kwangjo Kim, Sangjun Lee, Sangjun Park, Daiki Lee, How to Strengthen DES against Two Robust Attacks, proceedings of Joint Workshop on Information Security and Cryptology, 1995.
-
(1995)
Proceedings of Joint Workshop on Information Security and Cryptology
-
-
Kim, K.1
Lee, S.2
Park, S.3
Lee, D.4
-
22
-
-
84948949623
-
Truncated and higher order differentials
-
proceedings of Fast Software Encryption 2, Springer-Verlag
-
Lars Knudsen, Truncated and Higher Order Differentials, proceedings of Fast Software Encryption 2, Lecture Notes in Computer Science 1008, pp. 196-211, Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 196-211
-
-
Knudsen, L.1
-
23
-
-
84974667019
-
A chosen-plaintext linear attack on des
-
proceedings of Fast Software Encryption 7, Springer-Verlag
-
Lars R. Knudsen, John E. Mathiassen, A Chosen-Plaintext Linear Attack on DES, proceedings of Fast Software Encryption 7, Lecture Notes in Computer Science 1978, pp. 262-272, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1978
, pp. 262-272
-
-
Knudsen, L.R.1
Mathiassen, J.E.2
-
24
-
-
77949459994
-
Integral cryptanalysis
-
proceedings of Fast Software Encryption 9, Springer-Verlag
-
Lars R. Knudsen, David Wagner, Integral Cryptanalysis, proceedings of Fast Software Encryption 9, Lecture Notes in Computer Science 2365, pp. 112-127, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 112-127
-
-
Knudsen, L.R.1
Wagner, D.2
-
25
-
-
0041863249
-
Higher order derivations and differential cryptanalysis
-
Kluwer Academic Publishers
-
Xuejia Lai, Higher Order Derivations and Differential Cryptanalysis, in Communications and Cryptography: Two Sides of One Tapestry, Kluwer Academic Publishers, pp. 227-233, 1994.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 227-233
-
-
Lai, X.1
-
26
-
-
85011105685
-
A proposal for a new block cipher encryption standard
-
Advances in Cryptology, proceedings of EUROCRYPT '90, Springer-Verlag
-
Xuejia Lai, James L. Massey, A Proposal for a New Block Cipher Encryption Standard, Advances in Cryptology, proceedings of EUROCRYPT '90, Lecture Notes in Computer Science 473, pp. 389-404, Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 389-404
-
-
Lai, X.1
Massey, J.L.2
-
28
-
-
1642575733
-
Differential-linear cryptanalysis
-
Advances in Cryptology, proceedings of CRYPTO '94, Springer-Verlag
-
Susan K. Langford, Martin E. Hellman, Differential-Linear Cryptanalysis, Advances in Cryptology, proceedings of CRYPTO '94, Lecture Notes in Computer Science 839, pp. 17-25, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 17-25
-
-
Langford, S.K.1
Hellman, M.E.2
-
29
-
-
77649205039
-
The saturation attack - A bait for twofish
-
proceedings of Fast Software Encryption 8, Springer-Verlag
-
Stefan Lucks, The Saturation Attack - A Bait for Twofish, proceedings of Fast Software Encryption 8, Lecture Notes in Computer Science 2355, pp. 1-15, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2355
, pp. 1-15
-
-
Lucks, S.1
-
30
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Advances in Cryptology, proceedings of EUROCRYPT '93, Springer-Verlag
-
Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology, proceedings of EUROCRYPT '93, Lecture Notes in Computer Science 765, pp. 386-397, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
31
-
-
33747285760
-
A new method for known plaintext attack of FEAL cipher
-
Advances in Cryptology, proceedings of EUROCRYPT '92, Springer-Verlag
-
Mitsuru Matsui, Atsuhiro Yamagishi, A new method for known plaintext attack of FEAL cipher, Advances in Cryptology, proceedings of EUROCRYPT '92, Lecture Notes in Computer Science 658, pp. 81-91, Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 81-91
-
-
Matsui, M.1
Yamagishi, A.2
-
32
-
-
0003508568
-
-
Federal Information Processing Standards Publications No. 46
-
US National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publications No. 46, 1977.
-
(1977)
Data Encryption Standard
-
-
-
33
-
-
84958635277
-
Fast data encipherment algorithm FEAL
-
Advances in Cryptology, proceedings of EUROCRYPT '87, Springer-Verlag
-
Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encipherment Algorithm FEAL, Advances in Cryptology, proceedings of EUROCRYPT '87, Lecture Notes in Computer Science 304, pp. 267-278, Springer-Verlag, 1988.
-
(1988)
Lecture Notes in Computer Science
, vol.304
, pp. 267-278
-
-
Shimizu, A.1
Miyaguchi, S.2
-
34
-
-
35048891177
-
Differential-linear type attacks on reduced rounds of SHACAL-2
-
proceedings of ACISP 2004, Springer-Verlag
-
Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2, proceedings of ACISP 2004, Lecture Notes in Computer Science 3108, pp. 110-122, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 110-122
-
-
Shin, Y.1
Kim, J.2
Kim, G.3
Hong, S.4
Lee, S.5
-
35
-
-
21144435120
-
Provable security for block ciphers by decorrelation
-
Springer-Verlag
-
Serge Vaudenay, Provable Security for Block Ciphers by Decorrelation, Journal of Cryptology, Vol 16, Number 4, pp. 249-286, Springer-Verlag, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 249-286
-
-
Vaudenay, S.1
-
36
-
-
84945126868
-
The boomerang attack
-
proceedings of Fast Software Encryption 6, Springer-Verlag
-
David Wagner, The Boomerang Attack, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 156-170, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 156-170
-
-
Wagner, D.1
|