-
1
-
-
0012055850
-
Camellia: A 128-bit block cipher suitable for multiple platforms
-
Proceedings of Selected Areas in Cryptography - SAC 2000 (D. R. Stinson and S. E. Tavares, eds.), no. 2012 Springer-Verlag
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, "Camellia: A 128-bit block cipher suitable for multiple platforms." in Proceedings of Selected Areas in Cryptography - SAC 2000 (D. R. Stinson and S. E. Tavares, eds.), no. 2012 in LNCS, pp. 41-54, Springer-Verlag, 2001.
-
(2001)
LNCS
, pp. 41-54
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
3
-
-
0026397734
-
Differential cryptanalysis of des-like cryptosystems
-
E. Biham and A. Shamir, "Differential cryptanalysis of des-like cryptosystems." Journal of Cryptology, vol. 4, pp. 3-72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
0001820140
-
Cryptography and computer privacy
-
May
-
H. Feistel, "Cryptography and computer privacy." Scientific American, vol. 228, pp. 15-23, May 1973.
-
(1973)
Scientific American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
6
-
-
33645492588
-
-
Data Encryption Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., Jan.
-
Data Encryption Standard, "Federal Information Processing Standard (FIPS)." National Bureau of Standards, U.S. Department of Commerce, Washington D.C., Jan. 1977.
-
(1977)
Federal Information Processing Standard (FIPS)
-
-
-
7
-
-
84949229080
-
Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function
-
Proceedings of Selected Areas in Cryptography - SAC'00 (D. R. Stinson and S. E. Tavares, eds.), no. 2012 Springer-Verlag
-
M. Kanda, "Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function.in Proceedings of Selected Areas in Cryptography - SAC'00 (D. R. Stinson and S. E. Tavares, eds.), no. 2012 in LNCS, pp. 324-338, Springer-Verlag, 2001.
-
(2001)
LNCS
, pp. 324-338
-
-
Kanda, M.1
-
8
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff, "How to construct pseudorandom permutations from pseudorandom functions." SIAM Journal on Computing, vol. 17, pp. 373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
9
-
-
85025704284
-
Linear cryptanalysis of the data encryption standard
-
Proceedings of Eurocrypt'93 (T. Helleseth, ed.), no. 765 Springer-Verlag
-
M. Matsui, "Linear cryptanalysis of the data encryption standard." in Proceedings of Eurocrypt'93 (T. Helleseth, ed.), no. 765 in LNCS, pp. 386-397, Springer-Verlag, 1994.
-
(1994)
LNCS
, pp. 386-397
-
-
Matsui, M.1
-
10
-
-
84958979414
-
New structure of block ciphers with provable security against differential and linear cryptanalysis
-
Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 Springer-Verlag
-
M. Matsui, "New structure of block ciphers with provable security against differential and linear cryptanalysis." in Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 in LNCS, pp. 205-218, Springer-Verlag, 1996.
-
(1996)
LNCS
, pp. 205-218
-
-
Matsui, M.1
-
11
-
-
84974661986
-
Provable security against a differential cryptanalysis
-
Proceedings of Crypto'92 (E. F. Brickell, ed.), no. 740 Springer-Verlag
-
K. Nyberg and L. R. Knudsen, "Provable security against a differential cryptanalysis." in Proceedings of Crypto'92 (E. F. Brickell, ed.), no. 740 in LNCS, pp. 566-574, Springer-Verlag, 1993.
-
(1993)
LNCS
, pp. 566-574
-
-
Nyberg, K.1
Knudsen, L.R.2
-
12
-
-
84958979426
-
The cipher SHARK
-
Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 Springer-Verlag
-
V. Rijmen, J. Daemen, B. Preneel, A. Bossalaers, and E. D. Win, "The cipher SHARK." in Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 in LNCS, pp. 99-111, Springer-Verlag, 1996.
-
(1996)
LNCS
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bossalaers, A.4
Win, E.D.5
-
14
-
-
84958955327
-
Unbalanced Feistel networks and block cipher design
-
Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 Springer-Verlag
-
B. Schneier and J. Kelsey, "Unbalanced Feistel networks and block cipher design." in Proceedings of Fast Software Encryption - FSE'96 (D. Gollmann, ed.), no. 1039 in LNCS, pp. 121-144, Springer-Verlag, 1996.
-
(1996)
LNCS
, pp. 121-144
-
-
Schneier, B.1
Kelsey, J.2
-
15
-
-
0003412071
-
-
Primitive submitted to AES
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, "Twofish: A 128-bit block cipher." Primitive submitted to AES, 1998. Available at http://www.schneier.com/.
-
(1998)
Twofish: A 128-bit Block Cipher
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
16
-
-
35048862242
-
On the security of Feistel cipher with SP-type F function
-
H. Shimizu, "On the security of Feistel cipher with SP-type F function." in Proceedings of SCIS - SCIS 2001, 2001.
-
(2001)
Proceedings of SCIS - SCIS 2001
-
-
Shimizu, H.1
-
17
-
-
84949469334
-
Improved upper bounds of differential and linear characteristic probability for Camellia
-
Proceedings of Fast Software Encryption - FSE'02 (J. Daemen and V. Rijmen, eds.), no. 2365 Springer-Verlag
-
T. Shirai, S. Kanamaru, and G. Abe, "Improved upper bounds of differential and linear characteristic probability for Camellia." in Proceedings of Fast Software Encryption - FSE'02 (J. Daemen and V. Rijmen, eds.), no. 2365 in LNCS, pp. 128-142, Springer-Verlag, 2002.
-
(2002)
LNCS
, pp. 128-142
-
-
Shirai, T.1
Kanamaru, S.2
Abe, G.3
-
18
-
-
35048882958
-
Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices
-
Proceedings of Fast Software Encryption - FSE'04 (B. Roy and W. Meier, eds.), no. 3017 Springer-Verlag
-
T. Shirai and K. Shibutani, "Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices.in Proceedings of Fast Software Encryption - FSE'04 (B. Roy and W. Meier, eds.), no. 3017 in LNCS, pp. 260-278, Springer-Verlag, 2004.
-
(2004)
LNCS
, pp. 260-278
-
-
Shirai, T.1
Shibutani, K.2
|