메뉴 건너뛰기




Volumn 3017, Issue , 2004, Pages 94-108

Differential attacks against the helix stream cipher

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 26444613466     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25937-4_7     Document Type: Article
Times cited : (26)

References (18)
  • 1
    • 84937397479 scopus 로고    scopus 로고
    • Cryptanalysis of Stream Ciphers with Linear Masking
    • M. Yung, editor, Advances in Cryptology - Crypto'02, Springer
    • D. Coppersmith, S. Halevi, and C. Jutla. Cryptanalysis of Stream Ciphers with Linear Masking. In M. Yung, editor, Advances in Cryptology - Crypto'02, volume 2442 of Lectures Notes in Computer Science, pages 515-532. Springer, 2002.
    • (2002) Lectures Notes in Computer Science , vol.2442 , pp. 515-532
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.3
  • 2
    • 33645599732 scopus 로고    scopus 로고
    • SNOW - A New Stream Cipher
    • Submission to NESSIE
    • P. Ekdahl and T. Johansson. SNOW - a New Stream Cipher. In First Open NESSIE Workshop, KU-Leuven, 2000. Submission to NESSIE. Available at http://www.it.lth.se/cryptology/snow/.
    • (2000) First Open NESSIE Workshop, KU-Leuven
    • Ekdahl, P.1    Johansson, T.2
  • 3
    • 84949479756 scopus 로고    scopus 로고
    • Distinguishing Attacks on SOBER-t16 and t32
    • J. Daemen and V. Rijmen, editors, Fast Software Encryption - 2002, Springer
    • P. Ekdahl and T. Johansson. Distinguishing Attacks on SOBER-t16 and t32. In J. Daemen and V. Rijmen, editors, Fast Software Encryption - 2002, volume 2365 of Lectures Notes in Computer Science, pages 210-224. Springer, 2002.
    • (2002) Lectures Notes in Computer Science , vol.2365 , pp. 210-224
    • Ekdahl, P.1    Johansson, T.2
  • 7
    • 84958984550 scopus 로고    scopus 로고
    • Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
    • M. Matsui, editor, Fast Software Encryption - 2001, Springer
    • S. Fluhrer. Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 135-143. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2355 , pp. 135-143
    • Fluhrer, S.1
  • 8
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the Key Scheduling Algorithm of RC4
    • S. Vaudenay and A. M. Youssef, editors, Selected Areas in Cryptography - 2001, Springer
    • S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. In S. Vaudenay and A. M. Youssef, editors, Selected Areas in Cryptography - 2001, volume 2259 of Lectures Notes in Computer Science, pages 1-24. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 9
    • 84958968987 scopus 로고    scopus 로고
    • Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
    • M. Matsui, editor, Fast Software Encryption - 2001, Springer
    • V. D. Gligor and P. Donescu. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 192-108. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2355 , pp. 192-1108
    • Gligor, V.D.1    Donescu, P.2
  • 10
    • 84949426591 scopus 로고    scopus 로고
    • Scream: A Software-efficient Stream Cipher
    • L. Knudsen, editor, Fast Software Encryption - 2002, Springer
    • S. Halevi, D. Coppersmith, and C. Jutla. Scream : a Software-efficient Stream Cipher. In L. Knudsen, editor, Fast Software Encryption - 2002, volume 2332 of Lectures Notes in Computer Science, pages 195-209. Springer, 2002.
    • (2002) Lectures Notes in Computer Science , vol.2332 , pp. 195-209
    • Halevi, S.1    Coppersmith, D.2    Jutla, C.3
  • 11
    • 33646787968 scopus 로고    scopus 로고
    • Primitive Specification and Supporting Documentation for SOBER-t32
    • Submission to NESSIE
    • P. Hawkes and G. Rose. Primitive Specification and Supporting Documentation for SOBER-t32. In First Open NESSIE Workshop, 2000. Submission to NESSIE.
    • (2000) First Open NESSIE Workshop
    • Hawkes, P.1    Rose, G.2
  • 12
    • 84945137421 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, Springer
    • C. Jutla. Encryption Modes with Almost Free Message Integrity. In B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, volume 2045 of Lectures Notes in Computer Science, pages 529-544. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2045 , pp. 529-544
    • Jutla, C.1
  • 13
    • 84958984270 scopus 로고    scopus 로고
    • Efficient Algorithms for Computing Differential Properties of Addition
    • M. Matsui, editor, Fast Software Encryption - 2001, Springer
    • H. Lipmaa and S. Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 336-350. Springer, 2001.
    • (2001) Lectures Notes in Computer Science , vol.2355 , pp. 336-350
    • Lipmaa, H.1    Moriai, S.2
  • 16
    • 84994869893 scopus 로고
    • A Software-optimized Encryption Algorithm
    • R. Anderson, editor, Fast Software Encryption - 1994, Springer-Verlag
    • P. Rogaway and D. Coppersmith. A Software-optimized Encryption Algorithm. In R. Anderson, editor, Fast Software Encryption - 1994, volume 809 of Lectures Notes in Computer Science, pages 56-63. Springer-Verlag, 1994.
    • (1994) Lectures Notes in Computer Science , vol.809 , pp. 56-63
    • Rogaway, P.1    Coppersmith, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.