-
1
-
-
84997630754
-
A Self-Study Course in Block-Cipher Cryptanalysis
-
Schneier, B., A Self-Study Course in Block-Cipher Cryptanalysis, Cryptologia, 2000, vol. 24, no.1, pp. 18-34.
-
(2000)
Cryptologia
, vol.24
, Issue.1
, pp. 18-34
-
-
Schneier, B.1
-
2
-
-
31344462815
-
Block Ciphers and Stream Ciphers: The State of the Art
-
Report 2004/094. Available at
-
Biryukov, A., Block Ciphers and Stream Ciphers: The State of the Art, Cryptology ePrint Archive, 2004, Report 2004/094. Available at http://eprint.iacr.org/2004/094/.
-
(2004)
Cryptology ePrint Archive
-
-
Biryukov, A.1
-
3
-
-
84944878354
-
-
Boca Raton: CRC Press
-
Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A., Handbook of Applied Cryptography, Boca Raton: CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
4
-
-
31344463855
-
-
Moscow: Nauchn. Mir Extended English version: Basics of Contemporary Cryptography for IT Practitioners, Singapore: World Scientific, 2005
-
Ryabko, B. and Fionov, A., Osnovy sovremennoi kriptografii dlya spetsialistov v informatsionnykh tekhnologiyakh, Moscow: Nauchn. Mir, 2004. Extended English version: Basics of Contemporary Cryptography for IT Practitioners, Singapore: World Scientific, 2005.
-
(2004)
Osnovy Sovremennoi Kriptografii Dlya Spetsialistov V Informatsionnykh Tekhnologiyakh
-
-
Ryabko, B.1
Fionov, A.2
-
5
-
-
0003851399
-
-
New York: Wiley 2nd ed.
-
Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, New York: Wiley, 1996, 2nd ed.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
6
-
-
31344459175
-
-
Correlation in RC6, July Available at
-
Knudsen, R.L. and Meier, W., Correlation in RC6, July 1999. Available at http://csrc.nist.gov/CryptoToolkit/aes/round2/comments/ 19990812-lknudsen.pdf.
-
(1999)
-
-
Knudsen, R.L.1
Meier, W.2
-
7
-
-
4344669719
-
Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6
-
New York Available at
-
Shimoyama, T., Takeuchi, K., and Hayakawa, J., Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6, in Proc. 3rd AES Candidate Conf., New York, 2000. Available at http://csrc.nist.gov/ CryptoToolkit/aes/round2/conf3/papers/36-tshimoyama.pdf.
-
(2000)
Proc. 3rd AES Candidate Conf.
-
-
Shimoyama, T.1
Takeuchi, K.2
Hayakawa, J.3
-
8
-
-
0003618441
-
Report on the Development of the Advanced Encryption Standart (AES)
-
October Available at
-
Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E., Report on the Development of the Advanced Encryption Standart (AES), October 2000. Available at http://csrc.nist.gov/ encryption/aes/round2/r2report.pdf.
-
(2000)
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
9
-
-
31344437409
-
Randomness Testing of the Advanced Encryption Standard Finalist Candidates
-
New York Available at
-
Soto, J. and Bassham, L., Randomness Testing of the Advanced Encryption Standard Finalist Candidates, in Proc. 3rd AES Candidate Conf., New York, 2000. Available at http://csrc.nist.gov/encryption/aes/round2/conf3/ papers/30-jsoto.pdf.
-
(2000)
Proc. 3rd AES Candidate Conf.
-
-
Soto, J.1
Bassham, L.2
-
10
-
-
0003657590
-
-
Reading: Addison Wesley 2nd ed. Translated under the title Iskusstvo programmirovaniya na EVM: Osnovnye algoritmy, Moscow: Mir, 1984
-
Knuth, D.E., The Art of Computer Programming, vol. 1: Fundamental Algorithms, Reading: Addison Wesley, 1973-1981, 2nd ed. Translated under the title Iskusstvo programmirovaniya na EVM: Osnovnye algoritmy, Moscow: Mir, 1984.
-
(1973)
The Art of Computer Programming, Vol. 1: Fundamental Algorithms
-
-
Knuth, D.E.1
-
11
-
-
0003822632
-
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
NIST Special Publication (SP 800-22) Available at
-
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, N., Dray, J., and Vo, S., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication (SP 800-22), 2001. Available at http://csrc.nist.gov/rng/SP800-22b.pdf.
-
(2001)
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, N.10
Dray, J.11
Vo, S.12
-
12
-
-
17844365301
-
Using Information Theory Approach to Randomness Testing
-
Ryabko, B.Ya. and Monarev, V.A., Using Information Theory Approach to Randomness Testing, J. Stat. Plan. Inference, 2005, vol. 133, no.1, pp. 95-110.
-
(2005)
J. Stat. Plan. Inference
, vol.133
, Issue.1
, pp. 95-110
-
-
Ryabko, B.Ya.1
Monarev, V.A.2
-
13
-
-
0141572509
-
2 Test for Discriminating between Close Hypotheses with a Large Number of Classes and Its Application to Some Cryptography Problems
-
[Probl. Inf. Trans. (Engl. Transl.), 2003, vol. 39, no. 2, pp. 207-215]
-
2 Test for Discriminating between Close Hypotheses with a Large Number of Classes and Its Application to Some Cryptography Problems, Probl. Peredachi Inf., 2003, vol. 39, no.2, pp. 53-62 [Probl. Inf. Trans. (Engl. Transl.), 2003, vol. 39, no. 2, pp. 207-215].
-
(2003)
Probl. Peredachi Inf.
, vol.39
, Issue.2
, pp. 53-62
-
-
Ryabko, B.Ya.1
Stognienko, V.S.2
Shokin, Yu.I.3
-
14
-
-
2542640930
-
"Book Stack" as a New Statistical Test for Random Numbers
-
[Probl. Inf. Trans. (Engl. Transl.), 2004, vol. 40, no. 1, pp. 66-71]
-
Ryabko, B.Ya. and Pestunov, A.I., "Book Stack" as a New Statistical Test for Random Numbers, Probl. Peredachi Inf., 2004, vol. 40, no.1, pp. 73-78 [Probl. Inf. Trans. (Engl. Transl.), 2004, vol. 40, no. 1, pp. 66-71].
-
(2004)
Probl. Peredachi Inf.
, vol.40
, Issue.1
, pp. 73-78
-
-
Ryabko, B.Ya.1
Pestunov, A.I.2
|