-
2
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. of Cryptology 7, 229-246 (1994)
-
(1994)
J. of Cryptology
, vol.7
, pp. 229-246
-
-
Biham, E.1
-
4
-
-
84957610784
-
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
-
-
-
5
-
-
84948988609
-
Advanced Slide Attacks
-
Preneel, B, ed, EURO-CRYPT 2000, Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EURO-CRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
6
-
-
84978995497
-
The Real Reason for Rivest's Phenomenon
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Coppersmith, D.: The Real Reason for Rivest's Phenomenon. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 535. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 535
-
-
Coppersmith, D.1
-
7
-
-
0000139052
-
Cryptanalysis of Alleged A5 Stream Cipher
-
Fumy, W, ed, EURO-CRYPT 1997, Springer, Heidelberg
-
Golić, J.: Cryptanalysis of Alleged A5 Stream Cipher, In: Fumy, W. (ed.) EURO-CRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 239-255
-
-
Golić, J.1
-
8
-
-
33646763786
-
Rediscovery of the Time Memory Tradeoff, Cryptology ePrint Archive
-
Report 2005/090
-
Hong, J., Sarkar, P.: Rediscovery of the Time Memory Tradeoff, Cryptology ePrint Archive, Report 2005/090 (2005)
-
(2005)
-
-
Hong, J.1
Sarkar, P.2
-
9
-
-
84962976253
-
Is DES a pure Cipher(Results of More Cycling Experiments on DES)
-
Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
-
Kaliski, B.S., Rivest, R.L., Sherman, A.T.: Is DES a pure Cipher(Results of More Cycling Experiments on DES). In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, p. 212. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 212
-
-
Kaliski, B.S.1
Rivest, R.L.2
Sherman, A.T.3
-
10
-
-
38149010306
-
Reflection Attacks on Product Ciphers, Cryptology ePrint Archive
-
Report 2007/043
-
Kara, O.: Reflection Attacks on Product Ciphers, Cryptology ePrint Archive, Report 2007/043 (2007)
-
(2007)
-
-
Kara, O.1
-
11
-
-
85025704284
-
Linear Cryptanalysis Method of DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
12
-
-
85032513290
-
Cycle Structures of the DES with Weak and Semi-Weak Keys
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Moore, J.H., Simmons, G.J.: Cycle Structures of the DES with Weak and Semi-Weak Keys, In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 9-32. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 9-32
-
-
Moore, J.H.1
Simmons, G.J.2
-
13
-
-
0023294945
-
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
-
IEEE Computer Society Press, Los Alamitos
-
Moore, J.H., Simmons, G.J.: Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. In: IEEE Transactions on Software Engineering, vol. SE-13, pp. 262-273. IEEE Computer Society Press, Los Alamitos (1987)
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, pp. 262-273
-
-
Moore, J.H.1
Simmons, G.J.2
-
16
-
-
84953635000
-
Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish)
-
Anderson, R, ed, Fast Software Encryption, Springer, Heidelberg
-
Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) Fast Software Encryption. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
17
-
-
38149138604
-
-
http://www.schneier.com/blowfish.html
-
-
-
-
18
-
-
84958986778
-
On the Weak Keys of Blowfish
-
Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
-
Vaudenay, S.: On the Weak Keys of Blowfish. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 27-32. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 27-32
-
-
Vaudenay, S.1
|