-
1
-
-
0005755797
-
Constructing Symmetric Ciphers Using the CAST Design Procedure
-
November, Kluwer Academic Publishers
-
C.M.Adams, "Constructing Symmetric Ciphers Using the CAST Design Procedure," Designs, Codes and Cryptography, Volume 12, Number 3, November, pp.283-316, Kluwer Academic Publishers, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.3
, pp. 283-316
-
-
Adams, C.M.1
-
2
-
-
0005246691
-
-
Request for Comments (RFC) 2144, Network Working Group, Internet Engineering Task Force, May
-
C.M.Adams, "The CAST-128 Encryption Algorithm," Request for Comments (RFC) 2144, Network Working Group, Internet Engineering Task Force, May, 1997.
-
(1997)
The CAST-128 Encryption Algorithm
-
-
Adams, C.M.1
-
4
-
-
85006024828
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Lecture Notes in Computer Science 765, Springer-Verlag
-
E.Biham, "New Types of Cryptanalytic Attacks Using Related Keys," Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.398- 409, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT'93
, pp. 398-409
-
-
Biham, E.1
-
5
-
-
0026397734
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Springer-Verlag
-
E.Biham and A.Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, Volume 4, Number 1, pp.3-72, Springer-Verlag, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
7
-
-
84947929289
-
The Interpolation Attack on Block Ciphers
-
FSE'97, Lecture Notes in Computer Science 1267, Springer-Verlag1997
-
T.Jakobsen and L.R.Knudsen, "The Interpolation Attack on Block Ciphers," Fast Software Encryption, FSE'97, Lecture Notes in Computer Science 1267, pp.28-40, Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
8
-
-
84948949623
-
Truncated and Higher Order Differentials
-
Lecture Note in Computer Science 1008, Springer-Verlag
-
L.R.Knudsen, "Truncated and Higher Order Differentials," Fast Software Encryption - Second International Workshop, Lecture Note in Computer Science 1008, pp.196-211, Springer-Verlag, 1995.
-
(1995)
Fast Software Encryption - Second International Workshop
, pp. 196-211
-
-
Knudsen, L.R.1
-
9
-
-
0041863249
-
Higher Order Derivatives and Differential Cryptanalysis
-
Kluwer Academic Publishers
-
X.Lai, "Higher Order Derivatives and Differential Cryptanalysis," Communications and Cryptography, pp.227-233, Kluwer Academic Publishers, 1994.
-
(1994)
Communications and Cryptography
, pp. 227-233
-
-
Lai, X.1
-
10
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Lecture Notes in Computer Science 765, Springer-Verlag
-
M.Matsui, "Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.386-397, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT'93
, pp. 386-397
-
-
Matsui, M.1
-
11
-
-
84947901764
-
Higher Order Differential Attack of a CAST Cipher
-
FSE'98, Lecture Notes in Computer Science 1372, Springer-Verlag
-
S.Moriai, T.Shimoyama, and T.Kaneko, "Higher Order Differential Attack of a CAST Cipher," Fast Software Encryption, FSE'98, Lecture Notes in Computer Science 1372, pp.17-31, Springer-Verlag, 1998.
-
(1998)
Fast Software Encryption
, pp. 17-31
-
-
Moriai, S.1
Shimoyama, T.2
Kaneko, T.3
-
12
-
-
0029632010
-
Provable Security Against a Differential Attack
-
Springer-Verlag
-
K.Nyberg and L.R.Knudsen, "Provable Security Against a Differential Attack," Journal of Cryptology, Vol.8, No.1, pp.27-37, Springer-Verlag, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.R.2
-
13
-
-
84947911088
-
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher
-
Lecture Notes in Computer Science 1396, Springer-Verlag
-
T.Shimoyama, S.Moriai, and T.Kaneko, "Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher," Information Security, First International Workshop, ISW'97, Lecture Notes in Computer Science 1396, pp.32-42, Springer-Verlag, 1998.
-
(1998)
Information Security, First International Workshop, ISW'97
, pp. 32-42
-
-
Shimoyama, T.1
Moriai, S.2
Kaneko, T.3
-
14
-
-
84949216801
-
-
Technical Report of IEICE, ISEC98-5, The Institute of Electronics, Information and Communication Engineers, (in Japanese)
-
H.Tanaka, K. Hisamatsu, and Toshinobu Kaneko, "Higher Order Differential Attack of MISTY without FL functions," Technical Report of IEICE, ISEC98-5, The Institute of Electronics, Information and Communication Engineers, 1998. (in Japanese)
-
(1998)
Higher Order Differential Attack of MISTY without FL functions
-
-
Tanaka, H.1
Hisamatsu, K.2
Kaneko, T.3
|