-
1
-
-
35248860702
-
A theoretical treatment of related-key attacks: RKA-PRPs RKA-PRFs and applications
-
E. Biham, editor, Eurocrypt 2003
-
M. Bellare, T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs RKA-PRFs and applications. E. Biham, editor, Eurocrypt 2003, Springer Lecture Notes in Computer Science # 2654, pp. 491-506.
-
Springer Lecture Notes in Computer Science
, vol.2654
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
3
-
-
85006024828
-
New types of cryptanalytic attacks using related keys
-
T. Helleseth, editor, Eurocrypt 93
-
E. Biham. New types of cryptanalytic attacks using related keys. T. Helleseth, editor, Eurocrypt 93, Springer Lecture Notes in Computer Science # 765, pp. 398-409.
-
Springer Lecture Notes in Computer Science
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
6
-
-
0012983374
-
DRAFT Recommendation for block cipher modes of operation: The RMAC authentication mode
-
October 18
-
Morris Dworkin. DRAFT Recommendation for block cipher modes of operation: the RMAC authentication mode. NIST Special Publication 800-38b. October 18, 2002.
-
(2002)
NIST Special Publication 800-38b
-
-
Dworkin, M.1
-
7
-
-
84974678303
-
Improved cryptanalysis of Rijndael
-
B. Schneier, editor, Fast Software Encryption 2000
-
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, D. Whiting. Improved cryptanalysis of Rijndael. B. Schneier, editor, Fast Software Encryption 2000, Springer Lecture Notes in Computer Science # 1978, pp. 213-230.
-
Springer Lecture Notes in Computer Science
, vol.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
8
-
-
84949450111
-
On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
-
J. Daemen, V. Rijmen, editors, Fast Software Encryption 2002
-
E. Jaulmes, A. Joux, F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction. J. Daemen, V. Rijmen, editors, Fast Software Encryption 2002, Springer Lecture Notes in Computer Science.
-
Springer Lecture Notes in Computer Science
-
-
Jaulmes, E.1
Joux, A.2
Valette, F.3
-
9
-
-
67650338267
-
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
N. Koblitz, editor, Crypto '96
-
J. Kelsey, B. Schneier, D. Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. N. Koblitz, editor, Crypto '96, Springer Lecture Notes in Computer Science # 1109, pp. 237-251.
-
Springer Lecture Notes in Computer Science
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
10
-
-
0006540774
-
Related-key cryptanalysis of 3-Way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
-
Y. Han, T. Okamoto, S. Quing, editors, Information and Communications Security '97
-
J. Kelsey, B. Schneier, D. Wagner. Related-key cryptanalysis of 3-Way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Y. Han, T. Okamoto, S. Quing, editors, Information and Communications Security '97, Springer Lecture Notes in Computer Science # 1334, pp. 233-246.
-
Springer Lecture Notes in Computer Science
, vol.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
11
-
-
35048892576
-
Cryptanalysis of LOK191
-
J. Seberry, Y. Zheng, editors, Auscrypt '92
-
L. Knudsen. Cryptanalysis of LOK191. J. Seberry, Y. Zheng, editors, Auscrypt '92, Springer Lecture Notes in Computer Science # 718, pp. 196-208.
-
Springer Lecture Notes in Computer Science
, vol.718
, pp. 196-208
-
-
Knudsen, L.1
-
12
-
-
0242656062
-
Analysis of RMAC
-
T. Johansson, editor, Fast Software Encryption 2003
-
L. Knudsen, T. Kohno. Analysis of RMAC. T. Johansson, editor, Fast Software Encryption 2003, Springer Lecture Notes in Computer Science # 2887, pp. 182-191.
-
Springer Lecture Notes in Computer Science
, vol.2887
, pp. 182-191
-
-
Knudsen, L.1
Kohno, T.2
-
13
-
-
84937407660
-
Tweakable block ciphers
-
M. Yung, editor, Crypto '02
-
M. Liskov, R. Rivest, D. Wagner. Tweakable block ciphers. M. Yung, editor, Crypto '02, Springer Lecture Notes in Computer Science # 2422, pp. 31-46.
-
Springer Lecture Notes in Computer Science
, vol.2422
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.2
Wagner, D.3
-
14
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
M. Naor, O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. J. of Cryptology, vol 12, 1999, pp. 29-66.
-
(1999)
J. of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
15
-
-
84957652328
-
New public key cryptosystems based on the dependent-RSA problems
-
Jacques Stern, editor, Eurocrypt 1999
-
D. Pointcheval. New public key cryptosystems based on the dependent-RSA problems. Jacques Stern, editor, Eurocrypt 1999, Springer Lecture Notes in Computer Science # 1592, pp. 239-254.
-
Springer Lecture Notes in Computer Science
, vol.1592
, pp. 239-254
-
-
Pointcheval, D.1
|