-
2
-
-
48249125955
-
-
Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of Salsa, ChaCha, and Rumba (2007), http://eprint.iacr.org/2007/472
-
(2007)
New features of Latin dances: Analysis of Salsa, ChaCha, and Rumba
-
-
Aumasson, J.-P.1
Fischer, S.2
Khazaei, S.3
Meier, W.4
Rechberger, C.5
-
3
-
-
48249097256
-
-
Barua, R., Lange, T. (eds.): INDOCRYPT 2006. LNCS, 4329. Springer, Heidelberg (2006) See [14]
-
Barua, R., Lange, T. (eds.): INDOCRYPT 2006. LNCS, vol. 4329. Springer, Heidelberg (2006) See [14]
-
-
-
-
4
-
-
48249107557
-
-
Bernstein, D.J.: The Poly1305-AES message-authentication code in [15], pp. 32-49 (2005) (ID 0018d9551b5546d97c340e0dd8cb5750), http://cr.yp.to/papers. html#poly1305
-
Bernstein, D.J.: The Poly1305-AES message-authentication code in [15], pp. 32-49 (2005) (ID 0018d9551b5546d97c340e0dd8cb5750), http://cr.yp.to/papers. html#poly1305
-
-
-
-
5
-
-
48249092398
-
-
Bernstein, D.J.: Cache-timing attacks on AES (2005) (ID cd9faae9bd5308c440df50fc26a517b4), http://cr.yp.to/papers.html#cachetiming
-
Bernstein, D.J.: Cache-timing attacks on AES (2005) (ID cd9faae9bd5308c440df50fc26a517b4), http://cr.yp.to/papers.html#cachetiming
-
-
-
-
9
-
-
48249095124
-
-
Bernstein, D.J.: Polynomial evaluation and message authentication (2007) (ID b1ef3f2d385a926123e1517392e20f8c), http://cr.yp.to/papers.html#pema
-
Bernstein, D.J.: Polynomial evaluation and message authentication (2007) (ID b1ef3f2d385a926123e1517392e20f8c), http://cr.yp.to/papers.html#pema
-
-
-
-
10
-
-
0346494239
-
-
Burwick, C., Coppersmith, D., D'Avignon, E., Gennaro, R., Halevi, S., Jutla, C., Matyas Jr., S.M., OĆonnor, L., Peyravian, M., Safford, D., Zunic, N.: MARS: a candidate cipher for AES (1999), www.research.ibm.com/ security/mars.pdf
-
(1999)
MARS: A candidate cipher for AES
-
-
Burwick, C.1
Coppersmith, D.2
D'Avignon, E.3
Gennaro, R.4
Halevi, S.5
Jutla, C.6
Matyas Jr., S.M.7
OĆonnor, L.8
Peyravian, M.9
Safford, D.10
Zunic, N.11
-
11
-
-
48249088604
-
-
Crowley, P.: Truncated differential cryptanalysis of five rounds of Salsa20. In: Workshop Record of SASC 2006: Stream Ciphers Revisted, eSTREAM technical report 2005/073 (2005), http://www.ecrypt.eu.org/stream/papers.html
-
Crowley, P.: Truncated differential cryptanalysis of five rounds of Salsa20. In: Workshop Record of SASC 2006: Stream Ciphers Revisted, eSTREAM technical report 2005/073 (2005), http://www.ecrypt.eu.org/stream/papers.html
-
-
-
-
12
-
-
48249151917
-
-
Davies, D.W. (ed.): EUROCRYPT 1991. LNCS, 547. Springer, Heidelberg (1991) See [17]
-
Davies, D.W. (ed.): EUROCRYPT 1991. LNCS, vol. 547. Springer, Heidelberg (1991) See [17]
-
-
-
-
13
-
-
0242571721
-
-
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: fast encryption and authentication in a single cryptographic primitive, in [16], pp. 330-346 (2003), http://www.macfergus.com/helix/
-
Ferguson, N., Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: fast encryption and authentication in a single cryptographic primitive, in [16], pp. 330-346 (2003), http://www.macfergus.com/helix/
-
-
-
-
14
-
-
84997348492
-
-
3, pp
-
Fischer, S., Meier, W., Berbain, C., Biasse, J.-F., Robshaw, M.J.B.: Non-randomness in eSTREAM candidates Salsa20 and TSC-4, in [3], pp. 2-16 (2006)
-
(2006)
Non-randomness in eSTREAM candidates Salsa20 and TSC-4
, pp. 2-16
-
-
Fischer, S.1
Meier, W.2
Berbain, C.3
Biasse, J.-F.4
Robshaw, M.J.B.5
-
15
-
-
48249116895
-
-
Gilbert, H., Handschuh, H. (eds.): FSE 2005. LNCS, 3557. Springer, Heidelberg (2005), See [4]
-
Gilbert, H., Handschuh, H. (eds.): FSE 2005. LNCS, vol. 3557. Springer, Heidelberg (2005), See [4]
-
-
-
-
16
-
-
48249099835
-
-
Johansson, T. (ed.): FSE 2003. LNCS, 2887. Springer, Heidelberg (2003), See [13]
-
Johansson, T. (ed.): FSE 2003. LNCS, vol. 2887. Springer, Heidelberg (2003), See [13]
-
-
-
-
17
-
-
85028910917
-
-
12, pp
-
Lai, X., Massey, J.L., Murphy, S.: Markov ciphers and differential cryptanalysis, in [12], pp. 17-38 (1991)
-
(1991)
Markov ciphers and differential cryptanalysis
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
19
-
-
0035327448
-
Report on the development of the Advanced Encryption Standard (AES)
-
Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., Roback, E.: Report on the development of the Advanced Encryption Standard (AES). Journal of Research of the National Institute of Standards and Technology 106 (2001), http://nvl.nist.gov/pub/nistpubs/jres/106/3/cnt106-3.htm
-
(2001)
Journal of Research of the National Institute of Standards and Technology
, vol.106
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
20
-
-
48249105609
-
-
Paillier, P., Verbauwhede, I. (eds.): CHES 2007. LNCS, 4727. Springer, Heidelberg (2007) See [18]
-
Paillier, P., Verbauwhede, I. (eds.): CHES 2007. LNCS, vol. 4727. Springer, Heidelberg (2007) See [18]
-
-
-
-
21
-
-
48249107191
-
-
Preneel, B. (ed.): FSE 1994. LNCS, 1008. Springer, Heidelberg (1995) See [23]
-
Preneel, B. (ed.): FSE 1994. LNCS, vol. 1008. Springer, Heidelberg (1995) See [23]
-
-
-
-
22
-
-
84997161749
-
Differential crypt-analysis of Salsa20/8
-
Tsunoo, Y., Saito, T., Kubo, H., Suzaki, T., Nakashima, H.: Differential crypt-analysis of Salsa20/8. In: Workshop Record of SASC 2007: The State of the Art of Stream Ciphers, eSTREAM report 2007/010 (2007), http://www.ecrypt.eu.org/ stream/papers.html
-
(2007)
Workshop Record of SASC 2007: The State of the Art of Stream Ciphers, eSTREAM report 2007/010
-
-
Tsunoo, Y.1
Saito, T.2
Kubo, H.3
Suzaki, T.4
Nakashima, H.5
-
23
-
-
84869815133
-
-
21, pp
-
Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm, in [21], pp. 363-366 (1995)
-
(1995)
TEA, a tiny encryption algorithm
, pp. 363-366
-
-
Wheeler, D.J.1
Needham, R.M.2
|