-
2
-
-
33746041431
-
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. of Cryptology 7, 229-246 (1994)
-
(1994)
J. of Cryptology
, vol.7
, pp. 229-246
-
-
Biham, E.1
-
4
-
-
38149088948
-
-
Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 153-166. Springer, Heidelberg (2007)
-
Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 153-166. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
24944515451
-
Related-Key Boomerang and Rectangle Attacks
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
6
-
-
55749108795
-
New Cryptanalytic Results on IDEA
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Biham, E., Dunkelman, O., Keller, N.: New Cryptanalytic Results on IDEA. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 412-427. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 412-427
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
7
-
-
84897580639
-
-
Biham, E., Dunkelman, O., Keller, N.: A Simple Related-Key Attack on the Full SHACAL-1. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 20-30. Springer, Heidelberg (2006)
-
Biham, E., Dunkelman, O., Keller, N.: A Simple Related-Key Attack on the Full SHACAL-1. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 20-30. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
50249103823
-
-
Biham, E., Dunkelman, O., Keller, N.: A Unified Approach to Related-Key Attacks. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 73-96. Springer, Heidelberg (2008)
-
Biham, E., Dunkelman, O., Keller, N.: A Unified Approach to Related-Key Attacks. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 73-96. Springer, Heidelberg (2008)
-
-
-
-
10
-
-
84957610784
-
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 245-259. Springer, Heidelberg (1999)
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
-
-
-
11
-
-
84948988609
-
Advanced Slide Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
12
-
-
84956858200
-
-
Carter, G., Dawson, E., Nielsen, L.: Key Schedules of Iterated Block Ciphers. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, 1438, pp. 80-89. Springer, Heidelberg (1998)
-
Carter, G., Dawson, E., Nielsen, L.: Key Schedules of Iterated Block Ciphers. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 80-89. Springer, Heidelberg (1998)
-
-
-
-
13
-
-
84978995497
-
The Real Reason for Rivest's Phenomenon
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Coppersmith, D.: The Real Reason for Rivest's Phenomenon. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 535-536. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.218
, pp. 535-536
-
-
Coppersmith, D.1
-
14
-
-
50249137714
-
-
Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 89-104. Springer, Heidelberg (2008)
-
Courtois, N., Bard, G.V., Wagner, D.: Algebraic and Slide Attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 89-104. Springer, Heidelberg (2008)
-
-
-
-
15
-
-
38149032323
-
-
Dunkelman, O., Keller, N., Kim, J.: Related-Key Rectangle Attack on the Full SHACAL-1. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 28-44. Springer, Heidelberg (2007)
-
Dunkelman, O., Keller, N., Kim, J.: Related-Key Rectangle Attack on the Full SHACAL-1. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 28-44. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
0000139052
-
Cryptanalysis of Alleged A5 Stream Cipher
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Golić, J.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239-255. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 239-255
-
-
Golić, J.1
-
17
-
-
84949982494
-
Slide Attacks with a Known-Plaintext Cryptanalysis
-
Kim, K.-c, ed, ICISC 2001, Springer, Heidelberg
-
Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 214-225. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2288
, pp. 214-225
-
-
Furuya, S.1
-
18
-
-
58549090197
-
-
PhD Thesis, ISRC, Faculty of Information Technology, Queensland University of Technology
-
Henricksen, M.: Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers. PhD Thesis, ISRC, Faculty of Information Technology, Queensland University of Technology (2005)
-
(2005)
Design, Implementation and Cryptanalysis of Modern Symmetric Ciphers
-
-
Henricksen, M.1
-
19
-
-
33646763786
-
Rediscovery of the Time Memory Tradeoff. In: Cryptology ePrint Archive
-
Report 2005/090
-
Hong, J., Sarkar, P.: Rediscovery of the Time Memory Tradeoff. In: Cryptology ePrint Archive, Report 2005/090 (2005)
-
(2005)
-
-
Hong, J.1
Sarkar, P.2
-
20
-
-
26444515034
-
-
Hong, S., Kim, J., Kim, G., Lee, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 368-383. Springer, Heidelberg (2005)
-
Hong, S., Kim, J., Kim, G., Lee, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 368-383. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
84962976253
-
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)
-
Williams, H.C, ed, CRYPTO 1985, Springer, Heidelberg
-
Kaliski, B.S., Rivest, R.L., Sherman, T.: Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 212-222. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 212-222
-
-
Kaliski, B.S.1
Rivest, R.L.2
Sherman, T.3
-
22
-
-
38149004545
-
-
Kara, O., Manap, C.: A new class of Weak Keys for Blowfish. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 167-180. Springer, Heidelberg (2007)
-
Kara, O., Manap, C.: A new class of Weak Keys for Blowfish. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 167-180. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
84944028839
-
-
Kelsey, J., Schneier, B.: Key-Schedule Cryptanalysis of DEAL. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, 1758, pp. 118-134. Springer, Heidelberg (2000)
-
Kelsey, J., Schneier, B.: Key-Schedule Cryptanalysis of DEAL. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 118-134. Springer, Heidelberg (2000)
-
-
-
-
24
-
-
67650338267
-
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Kelsey, J., Schneier, B.,Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
25
-
-
35048899747
-
-
Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 299-316. Springer, Heidelberg (2004)
-
Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
-
-
-
-
26
-
-
38149085478
-
-
Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 225-241. Springer, Heidelberg (2007)
-
Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
-
-
-
-
28
-
-
35048892576
-
-
Knudsen, L.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, 718, pp. 196-208. Springer, Heidelberg (1993)
-
Knudsen, L.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1993)
-
-
-
-
29
-
-
84957685431
-
-
Lucks, S.: On the Security of 128-Bit Block Cipher DEAL. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, 1636, pp. 60-70. Springer, Heidelberg (1999)
-
Lucks, S.: On the Security of 128-Bit Block Cipher DEAL. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 60-70. Springer, Heidelberg (1999)
-
-
-
-
30
-
-
85025704284
-
Linear Cryptanalysis Method of DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis Method of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
31
-
-
85032513290
-
Cycle Structure of the DES with Weak and Semi-Weak Keys
-
Odlyzko, A.M, ed, CRYPTO 1986, Springer, Heidelberg
-
Moore, J.H., Simmons, G.J.: Cycle Structure of the DES with Weak and Semi-Weak Keys. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 9-32. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 9-32
-
-
Moore, J.H.1
Simmons, G.J.2
-
32
-
-
0023294945
-
Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys
-
Moore, J.H., Simmons, G.J.: Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. IEEE Transactions on Software Engineering 13, 262-273 (1987)
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, pp. 262-273
-
-
Moore, J.H.1
Simmons, G.J.2
-
33
-
-
84953635000
-
-
Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, 809, pp. 191-204. Springer, Heidelberg (1994)
-
Schneier, B.: Description of a New Variable - Length Key, 64 Bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
-
-
-
-
34
-
-
84949198848
-
-
Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, 2012, pp. 315-323. Springer, Heidelberg (2001)
-
Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315-323. Springer, Heidelberg (2001)
-
-
-
-
35
-
-
21144435120
-
Decorrelation: A Theory for Block Cipher Security
-
Vaudenay, S.: Decorrelation: A Theory for Block Cipher Security. J. of Cryptology 16(4), 249-286 (1985)
-
(1985)
J. of Cryptology
, vol.16
, Issue.4
, pp. 249-286
-
-
Vaudenay, S.1
-
36
-
-
58549088884
-
-
Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. In: Government Standard of the USSR, GOST 28147-89 (1989)
-
Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. In: Government Standard of the USSR, GOST 28147-89 (1989)
-
-
-
|