-
1
-
-
35048829391
-
New block cipher: ARIA
-
Pros. Information Security and Cryptology ICISC'03, Seoul, Korea, Springer-Verlag, November 27-28
-
Daesimg Kwon, Jaesung Kim, Sangwoo Park et al. New block cipher: ARIA. In Pros. Information Security and Cryptology (ICISC'03), Seoul, Korea, LNCS 2971, Springer-Verlag, November 27-28, 2003, pp.432-445.
-
(2003)
LNCS
, vol.2971
, pp. 432-445
-
-
Kwon, D.1
Kim, J.2
Park, S.3
-
2
-
-
0012022902
-
Specification of Camellia -A 128-bit block cipher
-
Proc. Selected Areas in Cryptography SAC'2000, Waterloo, Canada, Springer-Verlag, August 14-15
-
Aoki K, Ichikawa T, Kanda M et al. Specification of Camellia -A 128-bit block cipher. In Proc. Selected Areas in Cryptography (SAC'2000), Waterloo, Canada, LNCS 2012, Springer-Verlag, August 14-15, 2000, pp.183-191.
-
(2000)
LNCS
, pp. 183-191
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
-
3
-
-
84949951043
-
Truncated differential cryptanalysis of Camellia
-
Proc. Information Security and Oryptology ICISC'01, Seoul, Korea, Springer-Verlag, December 6-7
-
Lee S, Hong S, Lee S et al. Truncated differential cryptanalysis of Camellia. In Proc. Information Security and Oryptology (ICISC'01), Seoul, Korea, LNCS 2288, Springer-Verlag, December 6-7, 2001, pp.32-38.
-
(2001)
LNCS
, vol.2288
, pp. 32-38
-
-
Lee, S.1
Hong, S.2
Lee, S.3
-
4
-
-
84946831143
-
-
Sugita M, Kobara K, Imai H. Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. In Proc. Advances in Cryptology (Asiacrypt'01), Queensland, Australia, LNCS 224B, Springer-Verlag, December 9-13, 2001, pp193-207.
-
Sugita M, Kobara K, Imai H. Security of reduced version of the block cipher Camellia against truncated and impossible differential cryptanalysis. In Proc. Advances in Cryptology (Asiacrypt'01), Queensland, Australia, LNCS 224B, Springer-Verlag, December 9-13, 2001, pp193-207.
-
-
-
-
5
-
-
33645589195
-
Higher order differential attack of Camellia (II)
-
Newfoundland, Canada, LAICS'2595, Springer-Verlag, August 15-16
-
Hatano Y, Sekine H, Kaneko T. Higher order differential attack of Camellia (II). In Proc. Selected Areas in Cryptography (SAC'02), Newfoundland, Canada, LAICS'2595, Springer-Verlag, August 15-16, 2002, pp.39-56.
-
(2002)
Proc. Selected Areas in Cryptography (SAC'02)
, pp. 39-56
-
-
Hatano, Y.1
Sekine, H.2
Kaneko, T.3
-
6
-
-
84949446672
-
On the security of Camellia against the square attack
-
Proc. Fast Software Encryption FSE'08, Springer-Verlag, Leuven, Belgium, February 4-6
-
Yeom Y, Park S, Kim I. On the security of Camellia against the square attack. In Proc. Fast Software Encryption (FSE'08), Springer-Verlag, Leuven, Belgium, LNCS 2356, February 4-6, 2002, pp.89-99.
-
(2002)
LNCS
, vol.2356
, pp. 89-99
-
-
Yeom, Y.1
Park, S.2
Kim, I.3
-
7
-
-
34249847723
-
Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia
-
Munich, Germany, November 6-7, Available at
-
Shirai T. Differential, linear, boomerang and rectangle cryptanalysis of reduced-round Camellia. In Proc. the Third NESSIE Workshop, Munich, Germany, November 6-7, 2002. Available at: https://www.cosic.esat.kuleuven.be/ nessie/.
-
(2002)
Proc. the Third NESSIE Workshop
-
-
Shirai, T.1
-
8
-
-
33746329440
-
A study of integral type cryptanalysis on Camellia
-
Hamamatsu, Japan, January
-
Yeom Y, Park I, Kim I. A study of integral type cryptanalysis on Camellia. In Proc. The 2003 Symposium on Cryptography and Information Security (SCIS'03), Hamamatsu, Japan, January 2003, pp.26-29.
-
(2003)
Proc. The 2003 Symposium on Cryptography and Information Security (SCIS'03)
, pp. 26-29
-
-
Yeom, Y.1
Park, I.2
Kim, I.3
-
9
-
-
33750038591
-
Collision attack and pseudorandomness of reduced-round Camellia
-
Proc. Selected Areas in Cryptography SAC 2004, Waterloo, Canada, Springer-Verlag, August 9-10
-
Wenling Wu, Dengguo Feng, Hua Chen. Collision attack and pseudorandomness of reduced-round Camellia. In Proc. Selected Areas in Cryptography (SAC 2004), Waterloo, Canada, LNCS 3357, Springer-Verlag, August 9-10, 2004, pp.256-270.
-
(2004)
LNCS
, vol.3357
, pp. 256-270
-
-
Wu, W.1
Feng, D.2
Chen, H.3
-
10
-
-
33745633334
-
New observation on Camellia
-
Proc. Selected Areas in Cryptography SAC 2005, Springer-Verlag, Kingston, Canada, August 11-12
-
Duo Lei, Li Chao, Keqin Feng. New observation on Camellia. In Proc. Selected Areas in Cryptography (SAC 2005), Springer-Verlag, Kingston, Canada, LNCS 3897, August 11-12, 2005, pp.51-64.
-
(2005)
LNCS
, vol.3897
, pp. 51-64
-
-
Lei, D.1
Chao, L.2
Feng, K.3
-
11
-
-
32144451896
-
Pseudorandomness of Camellia-like scheme
-
Wenling Wu. Pseudorandomness of Camellia-like scheme. Journal of Computer Science and Technology, 2006, 21(1): 82-88.
-
(2006)
Journal of Computer Science and Technology
, vol.21
, Issue.1
, pp. 82-88
-
-
Wu, W.1
-
14
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Proc. Advances in Cryptology-EUROCRYPT'93, Lofthus, Norway, Springer-Verlag, May 23-27
-
Matsui M. Linear cryptanalysis method for DES cipher. In Proc. Advances in Cryptology-EUROCRYPT'93, Lofthus, Norway, LNCS 765, Springer-Verlag, May 23-27, 1993, pp.386-397.
-
(1993)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
15
-
-
84948949623
-
Truncated and higher order differentials
-
Proc. Fast Software Encryption FSE'95, Leuven, Belgium, Springer-Verlag, December
-
Knudsen L. Truncated and higher order differentials. In Proc. Fast Software Encryption (FSE'95), Leuven, Belgium, LNCS 2595, Springer-Verlag, December 1994, pp.196-211.
-
(1994)
LNCS
, vol.2595
, pp. 196-211
-
-
Knudsen, L.1
-
16
-
-
84957634424
-
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
-
Proc. Advances in Cryptology-EUROCRYPT'99, Rague, Czech Republic, Springer-Verlag, May 2-6
-
Biham E, Biryukov A, Shamir A. Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In Proc. Advances in Cryptology-EUROCRYPT'99, Rague, Czech Republic, LNCS 2595, Springer-Verlag, May 2-6, 1999, pp.12-23.
-
(1999)
LNCS
, vol.2595
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
17
-
-
84957610784
-
Slide attacks
-
Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, March 24-26
-
Biryukov A, Wagner D. Slide attacks. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1636, Springer-Verlag, March 24-26, 1999, pp.245-259.
-
(1636)
LNCS
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
18
-
-
84948988609
-
Advanced slide attacks
-
Proc. Advances in Cryptology-EUROCRYPT'00, Bruges, Belgium, Springer-Verlag, May 14-18
-
Biryukov A, Wagner D. Advanced slide attacks. In Proc. Advances in Cryptology-EUROCRYPT'00, Bruges, Belgium, LNCS 1807, Springer-Verlag, May 14-18, 2000, pp.589-606.
-
(1807)
LNCS
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
19
-
-
77949459994
-
Integral cryptanalysis (extended abstract)
-
Proc. Fast Software Encryption FSE 2002, Leuven, Belgium, Springer-Verlag, February 4-6
-
Knudsen L, Wagner D. Integral cryptanalysis (extended abstract). In Proc. Fast Software Encryption (FSE 2002), Leuven, Belgium, LNCS 2595, Springer-Verlag, February 4-6, 2002, pp.112-127.
-
(2002)
LNCS
, vol.2595
, pp. 112-127
-
-
Knudsen, L.1
Wagner, D.2
-
20
-
-
0001130184
-
The boomerang attack
-
Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, March 24-26
-
Wagner D. The boomerang attack. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1636, Springer-Verlag, March 24-26, 1999, pp.157-170.
-
(1636)
LNCS
, pp. 157-170
-
-
Wagner, D.1
-
21
-
-
84947929289
-
The interpolation attack against block ciphers
-
Proc. Fast Software Encryption FSE'99, Rome, Italy, Springer-Verlag, pp
-
Jakobsen T, Knudsen L. The interpolation attack against block ciphers. In Proc. Fast Software Encryption (FSE'99), Rome, Italy, LNCS 1267, Springer-Verlag, pp.28-40.
-
LNCS
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.2
-
22
-
-
84958765510
-
-
Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In Proc. Advances in Cryptology-ASIACRYPT'02, Queenstown, New Zealand, LNCS 2595, Springer-Verlag, December 1-5, 2002, pp.267-287.
-
Courtois N, Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations. In Proc. Advances in Cryptology-ASIACRYPT'02, Queenstown, New Zealand, LNCS 2595, Springer-Verlag, December 1-5, 2002, pp.267-287.
-
-
-
-
23
-
-
84949991813
-
Improved impossible differential cryptanalysis of Rijndael and Crypton
-
Proc. International Conference on Information Security and Cryptology ICISC'01, Seoul, South Korea, Springer-Verlag, December 6-7
-
Jung Hee Cheon, Munju Kim, Kwangjo Kim et al. Improved impossible differential cryptanalysis of Rijndael and Crypton. In Proc. International Conference on Information Security and Cryptology (ICISC'01), Seoul, South Korea, LNCS 2288, Springer-Verlag, December 6-7, 2001, pp.39-49.
-
(2001)
LNCS
, vol.2288
, pp. 39-49
-
-
Hee Cheon, J.1
Kim, M.2
Kim, K.3
-
24
-
-
2642584905
-
Impossible differential cryptanalysis of 7-round AES
-
Raphael Chung-Wei Phan. Impossible differential cryptanalysis of 7-round AES. Information Processing Letters, 2004, 91(1): 33-38.
-
(2004)
Information Processing Letters
, vol.91
, Issue.1
, pp. 33-38
-
-
Chung-Wei Phan, R.1
-
25
-
-
24944480579
-
Related-key differential cryptanalysis of 192-bit key AES variants
-
Proc. Selected Areas in Cryptography SAC'2003, Ottawa, Canada, Springer-Verlag, August 14-15
-
Goce Jakimoski, Yvo Desmedt. Related-key differential cryptanalysis of 192-bit key AES variants. In Proc. Selected Areas in Cryptography (SAC'2003), Ottawa, Canada, LNCS 3006, Springer-Verlag, August 14-15, 2003, pp.208-221.
-
(2003)
LNCS
, vol.3006
, pp. 208-221
-
-
Jakimoski, G.1
Desmedt, Y.2
-
26
-
-
33745642130
-
Related-key impossible differential attacks on 8-round AES-192
-
Proc. The Cryptographer's Track CT-RSA, San Jose, CA, USA, Springer-Verlag, February 13-17
-
Biham E, Orr Dunkelman, Nathan Keller. Related-key impossible differential attacks on 8-round AES-192. In Proc. The Cryptographer's Track (CT-RSA), San Jose, CA, USA, LNCS 3860, Springer-Verlag, February 13-17, 2006, pp.21-33.
-
(2006)
LNCS
, vol.3860
, pp. 21-33
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
27
-
-
38149050765
-
Improved related-key impossible differential attacks on reduced-round AES-192
-
Montreal, Canada, Springer-Verlag, August 17-18
-
Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng. Improved related-key impossible differential attacks on reduced-round AES-192. In Proc. Selected Areas in Cryptography (SAC'3006), Montreal, Canada, Springer-Verlag, August 17-18, 2006, pp.168-181.
-
(2006)
Proc. Selected Areas in Cryptography (SAC'3006)
, pp. 168-181
-
-
Zhang, W.1
Wu, W.2
Zhang, L.3
Feng, D.4
-
28
-
-
35048822981
-
-
Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song. Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer. In Proc. Int. Workshop on Information Security Applications, Jeju Island, Korea, LNCS 2908, Springer-Verlag, August 25-27, 2003, pp.489-503.
-
Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song. Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer. In Proc. Int. Workshop on Information Security Applications, Jeju Island, Korea, LNCS 2908, Springer-Verlag, August 25-27, 2003, pp.489-503.
-
-
-
|