메뉴 건너뛰기




Volumn 3017, Issue , 2004, Pages 359-370

Ciphers secure against related-key attacks

Author keywords

Block ciphers; Concrete security; Provable security; Pseudorandom functions; Related key attacks

Indexed keywords

CONCRETE BLOCKS; SECURITY OF DATA;

EID: 35048857407     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25937-4_23     Document Type: Article
Times cited : (59)

References (15)
  • 1
    • 35248860702 scopus 로고    scopus 로고
    • A theoretical treatment of related-key attacks: RKA-PRPs RKA-PRFs and applications
    • E. Biham, editor, Eurocrypt 2003
    • M. Bellare, T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs RKA-PRFs and applications. E. Biham, editor, Eurocrypt 2003, Springer Lecture Notes in Computer Science # 2654, pp. 491-506.
    • Springer Lecture Notes in Computer Science , vol.2654 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 3
    • 85006024828 scopus 로고    scopus 로고
    • New types of cryptanalytic attacks using related keys
    • T. Helleseth, editor, Eurocrypt 93
    • E. Biham. New types of cryptanalytic attacks using related keys. T. Helleseth, editor, Eurocrypt 93, Springer Lecture Notes in Computer Science # 765, pp. 398-409.
    • Springer Lecture Notes in Computer Science , vol.765 , pp. 398-409
    • Biham, E.1
  • 6
    • 0012983374 scopus 로고    scopus 로고
    • DRAFT Recommendation for block cipher modes of operation: The RMAC authentication mode
    • October 18
    • Morris Dworkin. DRAFT Recommendation for block cipher modes of operation: the RMAC authentication mode. NIST Special Publication 800-38b. October 18, 2002.
    • (2002) NIST Special Publication 800-38b
    • Dworkin, M.1
  • 8
    • 84949450111 scopus 로고    scopus 로고
    • On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction
    • J. Daemen, V. Rijmen, editors, Fast Software Encryption 2002
    • E. Jaulmes, A. Joux, F. Valette. On the security of randomized CBC-MAC beyond the birthday paradox limit: A new construction. J. Daemen, V. Rijmen, editors, Fast Software Encryption 2002, Springer Lecture Notes in Computer Science.
    • Springer Lecture Notes in Computer Science
    • Jaulmes, E.1    Joux, A.2    Valette, F.3
  • 9
    • 67650338267 scopus 로고    scopus 로고
    • Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • N. Koblitz, editor, Crypto '96
    • J. Kelsey, B. Schneier, D. Wagner. Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. N. Koblitz, editor, Crypto '96, Springer Lecture Notes in Computer Science # 1109, pp. 237-251.
    • Springer Lecture Notes in Computer Science , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 10
    • 0006540774 scopus 로고    scopus 로고
    • Related-key cryptanalysis of 3-Way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • Y. Han, T. Okamoto, S. Quing, editors, Information and Communications Security '97
    • J. Kelsey, B. Schneier, D. Wagner. Related-key cryptanalysis of 3-Way, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Y. Han, T. Okamoto, S. Quing, editors, Information and Communications Security '97, Springer Lecture Notes in Computer Science # 1334, pp. 233-246.
    • Springer Lecture Notes in Computer Science , vol.1334 , pp. 233-246
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 11
    • 35048892576 scopus 로고    scopus 로고
    • Cryptanalysis of LOK191
    • J. Seberry, Y. Zheng, editors, Auscrypt '92
    • L. Knudsen. Cryptanalysis of LOK191. J. Seberry, Y. Zheng, editors, Auscrypt '92, Springer Lecture Notes in Computer Science # 718, pp. 196-208.
    • Springer Lecture Notes in Computer Science , vol.718 , pp. 196-208
    • Knudsen, L.1
  • 12
    • 0242656062 scopus 로고    scopus 로고
    • Analysis of RMAC
    • T. Johansson, editor, Fast Software Encryption 2003
    • L. Knudsen, T. Kohno. Analysis of RMAC. T. Johansson, editor, Fast Software Encryption 2003, Springer Lecture Notes in Computer Science # 2887, pp. 182-191.
    • Springer Lecture Notes in Computer Science , vol.2887 , pp. 182-191
    • Knudsen, L.1    Kohno, T.2
  • 14
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudo-random permutations: Luby-Rackoff revisited
    • M. Naor, O. Reingold. On the construction of pseudo-random permutations: Luby-Rackoff revisited. J. of Cryptology, vol 12, 1999, pp. 29-66.
    • (1999) J. of Cryptology , vol.12 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 15
    • 84957652328 scopus 로고    scopus 로고
    • New public key cryptosystems based on the dependent-RSA problems
    • Jacques Stern, editor, Eurocrypt 1999
    • D. Pointcheval. New public key cryptosystems based on the dependent-RSA problems. Jacques Stern, editor, Eurocrypt 1999, Springer Lecture Notes in Computer Science # 1592, pp. 239-254.
    • Springer Lecture Notes in Computer Science , vol.1592 , pp. 239-254
    • Pointcheval, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.