-
1
-
-
84959045555
-
On MISTY1 higher order differential cryptanalysis
-
Won, D, ed, ICISC 2000, Springer, Heidelberg
-
Babbage, S., Frisch, L.: On MISTY1 higher order differential cryptanalysis. In: Won, D. (ed.) ICISC 2000. LNCS, vol. 2015, pp. 22-36. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2015
, pp. 22-36
-
-
Babbage, S.1
Frisch, L.2
-
2
-
-
84957694360
-
-
Biham, E., Biryukov, A., Shamir, A.: Miss in the Middle Attacks on IDEA and Khufu. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 124-138. Springer, Heidelberg (1999)
-
Biham, E., Biryukov, A., Shamir, A.: Miss in the Middle Attacks on IDEA and Khufu. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 124-138. Springer, Heidelberg (1999)
-
-
-
-
3
-
-
84957634424
-
Cryptanalysis of Skipjack Reduced to 31 Rounds
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12-23. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
0041750485
-
The Security of Feistel Ciphers with Six Rounds or Less
-
Knudsen, L.R.: The Security of Feistel Ciphers with Six Rounds or Less. Journal of Cryptology 15(3), 207-222 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 207-222
-
-
Knudsen, L.R.1
-
6
-
-
77949459994
-
-
Knudsen, L.R., Wagner, D.: Integral Cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 112-127. Springer, Heidelberg (2002)
-
Knudsen, L.R., Wagner, D.: Integral Cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112-127. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
84945134259
-
Cryptanalysis of Reduced-Round MISTY
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Kühn, U.: Cryptanalysis of Reduced-Round MISTY. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 325-339. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 325-339
-
-
Kühn, U.1
-
8
-
-
84949437856
-
-
Kühn, U.: Improved cryptanalysis of MISTY1. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 61-75. Springer, Heidelberg (2002)
-
Kühn, U.: Improved cryptanalysis of MISTY1. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 61-75. Springer, Heidelberg (2002)
-
-
-
-
9
-
-
43149101862
-
-
Lu, J., Kim, J., Keller, N., Dunkelman, O.: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008, 4964, pp. 370-386. Springer, Heidelberg (2008)
-
Lu, J., Kim, J., Keller, N., Dunkelman, O.: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. In: Malkin, T.G. (ed.) CT-RSA 2008, vol. 4964, pp. 370-386. Springer, Heidelberg (2008)
-
-
-
-
10
-
-
58349087367
-
-
Matsui, M.: Block encryption algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, 1267, pp. 64-74. Springer, Heidelberg (1997)
-
Matsui, M.: Block encryption algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 64-74. Springer, Heidelberg (1997)
-
-
-
-
11
-
-
84957686830
-
-
Tanaka, H., Hisamatsu, K., Kaneko, T.: Strength of MISTY1 without FL function for higher order differential attack. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds.) AAECC 1999. LNCS, 1719, pp. 221-230. Springer, Heidelberg (1999)
-
Tanaka, H., Hisamatsu, K., Kaneko, T.: Strength of MISTY1 without FL function for higher order differential attack. In: Fossorier, M.P.C., Imai, H., Lin, S., Poli, A. (eds.) AAECC 1999. LNCS, vol. 1719, pp. 221-230. Springer, Heidelberg (1999)
-
-
-
|