메뉴 건너뛰기




Volumn 1556, Issue , 1999, Pages 106-117

Higher order differential attack using chosen higher order differences

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 33745648399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48892-8_9     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 1
    • 0005755797 scopus 로고    scopus 로고
    • Constructing Symmetric Ciphers Using the CAST Design Procedure
    • November, Kluwer Academic Publishers
    • C.M.Adams, "Constructing Symmetric Ciphers Using the CAST Design Procedure," Designs, Codes and Cryptography, Volume 12, Number 3, November, pp.283-316, Kluwer Academic Publishers, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.3 , pp. 283-316
    • Adams, C.M.1
  • 2
    • 0005246691 scopus 로고    scopus 로고
    • Request for Comments (RFC) 2144, Network Working Group, Internet Engineering Task Force, May
    • C.M.Adams, "The CAST-128 Encryption Algorithm," Request for Comments (RFC) 2144, Network Working Group, Internet Engineering Task Force, May, 1997.
    • (1997) The CAST-128 Encryption Algorithm
    • Adams, C.M.1
  • 4
    • 85006024828 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Lecture Notes in Computer Science 765, Springer-Verlag
    • E.Biham, "New Types of Cryptanalytic Attacks Using Related Keys," Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.398- 409, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT'93 , pp. 398-409
    • Biham, E.1
  • 5
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • Springer-Verlag
    • E.Biham and A.Shamir, "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, Volume 4, Number 1, pp.3-72, Springer-Verlag, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 7
    • 84947929289 scopus 로고    scopus 로고
    • The Interpolation Attack on Block Ciphers
    • FSE'97, Lecture Notes in Computer Science 1267, Springer-Verlag1997
    • T.Jakobsen and L.R.Knudsen, "The Interpolation Attack on Block Ciphers," Fast Software Encryption, FSE'97, Lecture Notes in Computer Science 1267, pp.28-40, Springer-Verlag, 1997.
    • (1997) Fast Software Encryption , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 8
    • 84948949623 scopus 로고
    • Truncated and Higher Order Differentials
    • Lecture Note in Computer Science 1008, Springer-Verlag
    • L.R.Knudsen, "Truncated and Higher Order Differentials," Fast Software Encryption - Second International Workshop, Lecture Note in Computer Science 1008, pp.196-211, Springer-Verlag, 1995.
    • (1995) Fast Software Encryption - Second International Workshop , pp. 196-211
    • Knudsen, L.R.1
  • 9
    • 0041863249 scopus 로고
    • Higher Order Derivatives and Differential Cryptanalysis
    • Kluwer Academic Publishers
    • X.Lai, "Higher Order Derivatives and Differential Cryptanalysis," Communications and Cryptography, pp.227-233, Kluwer Academic Publishers, 1994.
    • (1994) Communications and Cryptography , pp. 227-233
    • Lai, X.1
  • 10
    • 85025704284 scopus 로고
    • Linear Cryptanalysis Method for DES Cipher
    • Lecture Notes in Computer Science 765, Springer-Verlag
    • M.Matsui, "Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.386-397, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT'93 , pp. 386-397
    • Matsui, M.1
  • 11
    • 84947901764 scopus 로고    scopus 로고
    • Higher Order Differential Attack of a CAST Cipher
    • FSE'98, Lecture Notes in Computer Science 1372, Springer-Verlag
    • S.Moriai, T.Shimoyama, and T.Kaneko, "Higher Order Differential Attack of a CAST Cipher," Fast Software Encryption, FSE'98, Lecture Notes in Computer Science 1372, pp.17-31, Springer-Verlag, 1998.
    • (1998) Fast Software Encryption , pp. 17-31
    • Moriai, S.1    Shimoyama, T.2    Kaneko, T.3
  • 12
    • 0029632010 scopus 로고
    • Provable Security Against a Differential Attack
    • Springer-Verlag
    • K.Nyberg and L.R.Knudsen, "Provable Security Against a Differential Attack," Journal of Cryptology, Vol.8, No.1, pp.27-37, Springer-Verlag, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 27-37
    • Nyberg, K.1    Knudsen, L.R.2
  • 13
    • 84947911088 scopus 로고    scopus 로고
    • Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher
    • Lecture Notes in Computer Science 1396, Springer-Verlag
    • T.Shimoyama, S.Moriai, and T.Kaneko, "Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher," Information Security, First International Workshop, ISW'97, Lecture Notes in Computer Science 1396, pp.32-42, Springer-Verlag, 1998.
    • (1998) Information Security, First International Workshop, ISW'97 , pp. 32-42
    • Shimoyama, T.1    Moriai, S.2    Kaneko, T.3
  • 14
    • 84949216801 scopus 로고    scopus 로고
    • Technical Report of IEICE, ISEC98-5, The Institute of Electronics, Information and Communication Engineers, (in Japanese)
    • H.Tanaka, K. Hisamatsu, and Toshinobu Kaneko, "Higher Order Differential Attack of MISTY without FL functions," Technical Report of IEICE, ISEC98-5, The Institute of Electronics, Information and Communication Engineers, 1998. (in Japanese)
    • (1998) Higher Order Differential Attack of MISTY without FL functions
    • Tanaka, H.1    Hisamatsu, K.2    Kaneko, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.