-
1
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
(extended abstract), Advances in Cryptology - CRYPTO'90, Springer-Verlag
-
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems (extended abstract), Advances in Cryptology - CRYPTO'90, LNCS, vol. 537, Springer-Verlag, 1990, pp. 2-21.
-
(1990)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
_, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology 4 (1991), no. 1, 3-72.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
-
4
-
-
84957868624
-
An information-theoretic model for steganography
-
Information Hiding, 2nd International Workshop, Springer-Verlag
-
C. Cachin, An information-theoretic model for steganography, Information Hiding, 2nd International Workshop, LNCS, vol. 1525, Springer-Verlag, 1998, pp. 306-318.
-
(1998)
LNCS
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
84948990962
-
Links between differential and linear cryptanalysis
-
Advances in Cryptology - EUROCRYPT'94, Springer-Verlag
-
F. Chabaud and S. Vaudenay, Links between differential and linear cryptanalysis, Advances in Cryptology - EUROCRYPT'94, LNCS, vol. 950, Springer-Verlag, 1995, pp. 356-365.
-
(1995)
LNCS
, vol.950
, pp. 356-365
-
-
Chabaud, F.1
Vaudenay, S.2
-
7
-
-
84937397479
-
Cryptanalysis of stream ciphers with linear masking
-
Advances in Cryptology - CRYPTO'02, Springer-Verlag
-
D. Coppersmith, S. Halevi, and C. Jutla, Cryptanalysis of stream ciphers with linear masking, Advances in Cryptology - CRYPTO'02, LNCS, vol. 2442, Springer-Verlag, 2002, pp. 515-532.
-
(2002)
LNCS
, vol.2442
, pp. 515-532
-
-
Coppersmith, D.1
Halevi, S.2
Jutla, C.3
-
9
-
-
0029632042
-
Pairs and triples of des S-boxes
-
D. Davies and S. Murphy, Pairs and triples of DES S-boxes, Journal of Cryptology 8 (1995), no. 1, 1-25.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 1-25
-
-
Davies, D.1
Murphy, S.2
-
10
-
-
84974716007
-
A statistical attack on RC6
-
Fast Software Encryption FSE'00, Springer-Verlag
-
H. Gilbert, H. Handschuh, A. Joux, and S. Vaudenay, A statistical attack on RC6, Fast Software Encryption FSE'00, LNCS, vol. 1978, Springer-Verlag, 2000, pp. 65-74.
-
(2000)
LNCS
, vol.1978
, pp. 65-74
-
-
Gilbert, H.1
Handschuh, H.2
Joux, A.3
Vaudenay, S.4
-
12
-
-
84947902146
-
2 cryptanalysis of the SEAL encryption algorithm
-
Fast Software Encryption FSE'97, Springer-Verlag
-
2 cryptanalysis of the SEAL encryption algorithm, Fast Software Encryption FSE'97, LNCS, vol. 1267, Springer-Verlag, 1997, pp. 1-12.
-
(1997)
LNCS
, vol.1267
, pp. 1-12
-
-
Handschuh, H.1
Gilbert, H.2
-
13
-
-
84947942693
-
Partitioning cryptanalysis
-
Fast Software Encryption FSE'97, Springer-Verlag
-
C. Harpes and J. Massey, Partitioning cryptanalysis, Fast Software Encryption FSE'97, LNCS, vol. 1267, Springer-Verlag, 1997, pp. 13-27.
-
(1997)
LNCS
, vol.1267
, pp. 13-27
-
-
Harpes, C.1
Massey, J.2
-
15
-
-
84974663037
-
Correlations in RC6 with a reduced number of rounds
-
Fast Software Encryption FSE'00, Springer-Verlag
-
L. Knudsen and W. Meier, Correlations in RC6 with a reduced number of rounds, Fast Software Encryption FSE'00, LNCS, vol. 1978, Springer-Verlag, 2000, pp. 94-108.
-
(2000)
LNCS
, vol.1978
, pp. 94-108
-
-
Knudsen, L.1
Meier, W.2
-
16
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal on Computing 17 (1988), no. 2, 373-386.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
17
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
-
M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology - EUROCRYPT'93, LNCS, vol. 765, Springer-Verlag, 1993, pp. 386-397.
-
(1993)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
18
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
Advances in Cryptology - CRYPTO'94, Springer-Verlag
-
_, The first experimental cryptanalysis of the Data Encryption Standard, Advances in Cryptology - CRYPTO'94, LNCS, vol. 839, Springer-Verlag, 1994, pp. 1-11.
-
(1994)
LNCS
, vol.839
, pp. 1-11
-
-
-
19
-
-
84938858421
-
A unified and generalized treatment of authentication theory
-
Proc. 13th Symp. on Theoretical Aspects of Computer Science (STACS'96), Springer-Verlag
-
U. Maurer, A unified and generalized treatment of authentication theory, Proc. 13th Symp. on Theoretical Aspects of Computer Science (STACS'96), LNCS, vol. 1046, Springer-Verlag, 1996, pp. 387-398.
-
(1996)
LNCS
, vol.1046
, pp. 387-398
-
-
Maurer, U.1
-
20
-
-
0034228863
-
Authentication theory and hypothesis testing
-
_, Authentication theory and hypothesis testing, IEEE Transactions on Information Theory 46 (2000), no. 4, 1350-1356.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1350-1356
-
-
-
21
-
-
84974663198
-
Stochastic cryptanalysis of Crypton
-
Fast Software Encryption FSE'00, Springer-Verlag
-
M. Minier and H. Gilbert, Stochastic cryptanalysis of Crypton, Fast Software Encryption FSE'00, LNCS, vol. 1978, Springer-Verlag, 2000, pp. 121-133.
-
(2000)
LNCS
, vol.1978
, pp. 121-133
-
-
Minier, M.1
Gilbert, H.2
-
22
-
-
35048881860
-
-
Technical report, Information Security Group, University of London, England
-
S. Murphy, F. Piper, M. Walker, and P. Wild, Likelihood estimation for block cipher keys, Technical report, Information Security Group, University of London, England, 1995.
-
(1995)
Likelihood Estimation for Block Cipher Keys
-
-
Murphy, S.1
Piper, F.2
Walker, M.3
Wild, P.4
-
23
-
-
85030461165
-
Perfect nonlinear S-boxes
-
Advances in Cryptology - EUROCRYPT'91, Springer-Verlag
-
K. Nyberg, Perfect nonlinear S-boxes, Advances in Cryptology - EUROCRYPT'91, LNCS, vol. 547, Springer-Verlag, 1991, pp. 378-386.
-
(1991)
LNCS
, vol.547
, pp. 378-386
-
-
Nyberg, K.1
-
24
-
-
0003508568
-
-
U.S. Department of Commerce
-
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, 1977.
-
(1977)
Data Encryption Standard
-
-
-
25
-
-
33646779445
-
Optimal resistance against the Davies and Murphy attack
-
Advances in Cryptology - ASIACRYPT'98, Springer-Verlag
-
T. Pornin, Optimal resistance against the Davies and Murphy attack, Advances in Cryptology - ASIACRYPT'98, LNCS, vol. 1514, Springer-Verlag, 2000, pp. 148-159.
-
(2000)
LNCS
, vol.1514
, pp. 148-159
-
-
Pornin, T.1
-
28
-
-
21144435120
-
Decorrelation: A theory for block cipher security
-
S. Vaudenay, Decorrelation: a theory for block cipher security, to appear in the Journal of Cryptology, Available on http://lasecwww.epfl.ch.
-
Journal of Cryptology
-
-
Vaudenay, S.1
-
30
-
-
84957641836
-
Resistance against general iterated attacks
-
Advances in Cryptology - EUROCRYPT'99, Springer-Verlag
-
_, Resistance against general iterated attacks, Advances in Cryptology - EUROCRYPT'99, LNCS, vol. 1592, Springer-Verlag, 1999, pp. 255-271.
-
(1999)
LNCS
, vol.1592
, pp. 255-271
-
-
|