-
1
-
-
35048894397
-
How far can we go beyond linear cryptanalysis?
-
LNCS 3329, Springer-Verlag
-
T. Baignéres, P. Junod, and S. Vaudenay. How Far Can We Go Beyond Linear Cryptanalysis? Advances in Cryptology - Asiacrypt 2004, LNCS 3329, Springer-Verlag, 2004. http://lasecwww.epfl.ch/php_code/publications/search.php?ref-BJV04
-
(2004)
Advances in Cryptology - Asiacrypt 2004
-
-
Baignéres, T.1
Junod, P.2
Vaudenay, S.3
-
2
-
-
0002555945
-
Differential cryptanalysis of DES-like cryptosystems
-
Springer-Verlag
-
E. Biham and A. Shamir. Differential Cryptanalysis of DES-like cryptosystems. Advances in Cryptology, CRYPTO '90, Springer-Verlag, pp. 2-21.
-
Advances in Cryptology, CRYPTO '90
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
84944886613
-
Ciphers with arbitrary finite domains
-
LNCS, Springer
-
John Black and Phillip Rogaway. Ciphers with Arbitrary Finite Domains. RSA Data Security Conference, Cryptographer's Track (RSA CT'02), LNCS, vol. 2271, pp. 114-130, Springer, 2002.
-
(2002)
RSA Data Security Conference, Cryptographer's Track (RSA CT'02)
, vol.2271
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
5
-
-
84948990962
-
Links between differential and linear cryptalysis
-
LNCS 950, Springer-Verlag
-
F. Chabaud and S. Vaudenay. Links between differential and linear cryptalysis. Advances in Cryptology, Proceedings Eurocrypt'94, LNCS 950, Springer-Verlag, 1995, pp.356-365.
-
(1995)
Advances in Cryptology, Proceedings Eurocrypt'94
, pp. 356-365
-
-
Chabaud, F.1
Vaudenay, S.2
-
8
-
-
58849165906
-
Statistics of correlation and differentials in block ciphers
-
Report 2005/212
-
J. Daemen et V. Rijmen. Statistics of Correlation and Differentials in Block Ciphers. Cryptology ePrint Archive, Report 2005/212, 2005 http://eprint.iacr.org/2005/212
-
(2005)
Cryptology EPrint Archive
-
-
Daemen, J.1
Rijmen, V.2
-
10
-
-
85028910917
-
Markov ciphers and differential Cryptanalysis
-
LNCS 547, D.W. Davies, Ed., Springer-Verlag
-
X. Lai, J.L. Massey, and S. Murphy. Markov ciphers and differential Cryptanalysis. Advances in Cryptology, Proceedings Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 17-38.
-
(1991)
Advances in Cryptology, Proceedings Eurocrypt'91
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
11
-
-
35048827899
-
On the additive differential probability of exclusive-or
-
Bimal Roy and Willi Meier, editors, volume 3017 of Lecture Notes in Computer Science, Delhi, India, February 5-7, Springer-Verlag
-
Helger Lipmaa, Johan Wallen and Philippe Dumas. On the Additive Differential Probability of Exclusive-Or. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 317-331, Delhi, India, February 5-7, 2004. Springer-Verlag.
-
(2004)
Fast Software Encryption 2004
, pp. 317-331
-
-
Lipmaa, H.1
Wallen, J.2
Dumas, P.3
-
12
-
-
85025704284
-
Linear Cryptanalysis method for des cipher
-
LNCS 765, T. Helleseth, Ed., Springer-Verlag
-
M. Matsui. Linear Cryptanalysis method for DES cipher. Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386-397.
-
(1994)
Advances in Cryptology, Proceedings Eurocrypt'93
, pp. 386-397
-
-
Matsui, M.1
-
13
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
LNCS 765, T. Helleseth, Ed., Springer-Verlag
-
K. Nyberg. Differentially uniform mappings for cryptography. Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 55-64.
-
(1994)
Advances in Cryptology, Proceedings Eurocrypt'93
, pp. 55-64
-
-
Nyberg, K.1
-
14
-
-
84948991282
-
Linear approximation of block ciphers
-
LNCS 950, Springer-Verlag
-
K. Nyberg. Linear Approximation of Block Ciphers. Advances in Cryptology, Proceedings Eurocrypt'94, LNCS 950, pages 439-444. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology, Proceedings Eurocrypt'94
, pp. 439-444
-
-
Nyberg, K.1
-
16
-
-
84899741631
-
New results on the twofish encryption algorithm
-
April
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson. New Results on the Twofish Encryption Algorithm. Second AES Candidate Conference, April 1999.
-
(1999)
Second AES Candidate Conference
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
|