-
1
-
-
85006024828
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Advances in Cryptology Eurocrypt '93, Springer-Verlag
-
Biham, E. 1994. New Types of Cryptanalytic Attacks Using Related Keys. Advances in Cryptology Eurocrypt '93, Lecture Notes in Computer Science, Springer-Verlag, Vol. 765, pp. 398-409.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
2
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Biham, E. 1994. "New Types of Cryptanalytic Attacks Using Related Keys," Journal of Cryptology, 7:229-246.
-
(1994)
Journal of Cryptology
, vol.7
, pp. 229-246
-
-
Biham, E.1
-
3
-
-
84949222471
-
Initial Observations on Skipjack - Cryptanalysis of Skipjack-3XOR
-
SAC '98, Springer-Verlag
-
Biham, E., A. Biryukov, O. Dunkelman, E. Richardson, and A. Shamir. 1998. Initial Observations on Skipjack - Cryptanalysis of Skipjack-3XOR. SAC '98, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1556, pp. 362-370.
-
(1998)
Lecture Notes in Computer Science
, vol.1556
, pp. 362-370
-
-
Biham, E.1
Biryukov, A.2
Dunkelman, O.3
Richardson, E.4
Shamir, A.5
-
4
-
-
84957634424
-
Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials
-
Advances in Cryptology-Eurocrypt '99, Springer-Verlag
-
Biham, E., A. Biryukov, and A. Shamir. 1999. Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials. Advances in Cryptology-Eurocrypt '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1592, pp. 12-23.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
84957694360
-
Miss in the Middle Attacks on IDEA, Khufu, and Khafre
-
FSE '99, Springer-Verlag
-
Biham, E., A. Biryukov, and A. Shamir. 1999. Miss in the Middle Attacks on IDEA, Khufu, and Khafre. FSE '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1636, pp. 124-138.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 124-138
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
6
-
-
84945132264
-
The Rectangle Attack-Rectangling the Serpent
-
Advances in Cryptology, Eurocrypt '01, Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2001. The Rectangle Attack-Rectangling the Serpent. Advances in Cryptology - Eurocrypt '01, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2045, pp. 340-357.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 340-357
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
7
-
-
84949456804
-
New Results on Boomerang, and Rectangle Attacks
-
FSE '02, Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2002. New Results on Boomerang, and Rectangle Attacks. FSE '02, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2365, pp. 1-16.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 1-16
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
8
-
-
0242570832
-
Rectangle Attacks on 49-Round SHACAL-1
-
FSE '03, Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2003. Rectangle Attacks on 49-Round SHACAL-1. FSE '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2887, pp. 22-35.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
, pp. 22-35
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
9
-
-
24944515451
-
Related-Key Boomerang, and Rectangle Attacks
-
Advances in Cryptology, Eurocrypt '05, Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2005. Related-Key Boomerang, and Rectangle Attacks. Advances in Cryptology - Eurocrypt '05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3494, pp. 507-525.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
10
-
-
33646781279
-
A Related-Key Rectangle Attack on the Full KASUMI
-
Advances in Cryptology, Asiacrypt'05, Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2005. A Related-Key Rectangle Attack on the Full KASUMI. Advances in Cryptology - Asiacrypt'05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3788, pp. 443-461.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 443-461
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
11
-
-
33745642130
-
Related-Key Impossible Differential Attacks on 8-Round AES-192
-
Springer-Verlag
-
Biham, E., O. Dunkelman, and N. Keller. 2006. Related-Key Impossible Differential Attacks on 8-Round AES-192. Topics in Cryptology - CT-RSA '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3860, pp. 21-33.
-
(2006)
Topics in Cryptology - CT-RSA '06, Lecture Notes in Computer Science
, vol.3860
, pp. 21-33
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
12
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems (Extended Abstract)
-
Advances in Cryptology, Crypto '90, Springer-Verlag
-
Biham, E. and A. Shamir. 1991. Differential Cryptanalysis of DES-like Cryptosystems (Extended Abstract). Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science, Springer-Verlag, Vol. 537, pp. 2-21.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
13
-
-
0026397734
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Biham, E. and A. Shamir. 1991. "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, 4(1):3-72.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
14
-
-
24144494187
-
The Boomerang Attack on 5, and 6-round Reduced AES
-
Springer-Verlag
-
Biryukov, A. 2004. The Boomerang Attack on 5, and 6-round Reduced AES. AES4, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3373, pp. 1-5.
-
(2004)
AES4, Lecture Notes in Computer Science
, vol.3373
, pp. 1-5
-
-
Biryukov, A.1
-
15
-
-
35248831758
-
Cryptanalysis of SAFER
-
Advances in Cryptology, Crypto '03, Springer-Verlag
-
Biryukov, A., C. De Canniere, and G. Dellkrantz. 2003. Cryptanalysis of SAFER. Advances in Cryptology - Crypto '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2729, pp. 195-211.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 195-211
-
-
Biryukov, A.1
De Canniere, C.2
Dellkrantz, G.3
-
16
-
-
84944029559
-
New Weak-Key Classes of IDEA
-
ICICS '02, Springer-Verlag
-
Biryukov, A., J. Nakahara, Jr, B. Preneel, and J. Vandewalle. 2002. New Weak-Key Classes of IDEA. ICICS '02, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2513, pp. 315-326.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 315-326
-
-
Biryukov, A.1
Nakahara Jr, J.2
Preneel, B.3
Vandewalle, J.4
-
17
-
-
84957610784
-
Slide Attacks
-
FSE '99, Springer-Verlag
-
Biryukov, A. and D. Wagner. 1999. Slide Attacks. FSE '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1636, pp. 245-259.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
18
-
-
84948988609
-
Advanced Slide Attacks
-
Advances n Cryptology, Eurocrypt '00, Springer-Verlag
-
Biryukov, A. and D. Wagner. 2000. Advanced Slide Attacks. Advances n Cryptology - Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1807, pp. 589-606.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
19
-
-
84875634542
-
-
July 28
-
Brickell, E. F., D. E. Denning, S. T. Kent, D. P. Maher, and W. Tuchman, SKIPJACK Review: The SKIPJACK Algorithm, Interim Report, July 28, 1993.
-
(1993)
SKIPJACK Review: The SKIPJACK Algorithm, Interim Report
-
-
Brickell, E.F.1
Denning, D.E.2
Kent, S.T.3
Maher, D.P.4
Tuchman, W.5
-
21
-
-
38149032323
-
Related-Key Rectangle Attack on the Full SHACAL-1
-
SAC '06, Springer-Verlag
-
Dunkelman, O., N. Keller, J. Kim. 2006. Related-Key Rectangle Attack on the Full SHACAL-1. SAC '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4356, pp. 28-44.
-
(2006)
Lecture Notes in Computer Science
, vol.4356
, pp. 28-44
-
-
Dunkelman, O.1
Keller, N.2
Kim, J.3
-
22
-
-
58549086813
-
New Related-Key Boomerang Attacks on AES
-
Progress in Cryptology, Indocrypt '08, Springer-Verlag
-
Gorski, M. and S. Lucks. 2008. New Related-Key Boomerang Attacks on AES. Progress in Cryptology - Indocrypt '08, Lecture Notes in Computer Science, Springer-Verlag, Vol. 5365, pp. 266-278.
-
(2008)
Lecture Notes in Computer Science
, vol.5365
, pp. 266-278
-
-
Gorski, M.1
Lucks, S.2
-
23
-
-
84958960240
-
Flaws in the Differential Cryptanalysis of Skipjack
-
FSE '01, Springer-Verlag
-
Granboulan, L. 2001. Flaws in the Differential Cryptanalysis of Skipjack. FSE '01, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2355, pp. 328-335.
-
(2001)
Lecture Notes in Computer Science
, vol.2355
, pp. 328-335
-
-
Granboulan, L.1
-
24
-
-
26444515034
-
Related-key Rectangle Attacks on Reduced Versions of SHACAL-1, and AES-192
-
Springer-Verlag
-
Hong, S., J. Kim, G. Kim, S. Lee, and B. Preneel. 2005. Related-key Rectangle Attacks on Reduced Versions of SHACAL-1, and AES-192. FSE '05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3557, pp. 368-383.
-
(2005)
FSE '05, Lecture Notes in Computer Science
, vol.3557
, pp. 368-383
-
-
Hong, S.1
Kim, J.2
Kim, G.3
Lee, S.4
Preneel, B.5
-
25
-
-
68149180409
-
-
Hui, L. C. K., X. Y. Wang, K. P. Chow, W. W. Tsang, C. F. Chong, and H. W. Chan. 2002. The Differential Analysis of Reduced Skipjack Variants, Chinacrypt 02.
-
Hui, L. C. K., X. Y. Wang, K. P. Chow, W. W. Tsang, C. F. Chong, and H. W. Chan. 2002. The Differential Analysis of Reduced Skipjack Variants, Chinacrypt 02.
-
-
-
-
26
-
-
84949475951
-
Saturation Attacks on Reduced Round Skipjack
-
FSE '02, Springer-Verlag
-
Hwang, K., W. Lee, S. Lee, S. Lee, and J. Lim. 2002. Saturation Attacks on Reduced Round Skipjack. FSE '02, Lecture Notes in Computer Science Springer-Verlag, Vol. 2365, pp. 100-111.
-
(2002)
Lecture Notes in Computer Science
, vol.2365
, pp. 100-111
-
-
Hwang, K.1
Lee, W.2
Lee, S.3
Lee, S.4
Lim, J.5
-
27
-
-
24944480579
-
Related-key Differential Cryptanalysis of 192-bit Key AES Variants
-
SAC '03, Springer-Verlag
-
Jakimoski, G., and Y. Desmedt. 2003. Related-key Differential Cryptanalysis of 192-bit Key AES Variants. SAC '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3006, pp. 208-221.
-
(2003)
Lecture Notes in Computer Science
, vol.3006
, pp. 208-221
-
-
Jakimoski, G.1
Desmedt, Y.2
-
28
-
-
38149081304
-
Related-key Amplified Boomerang Attacks on the Full-Round Eagle-64, and Eagle-128
-
ACISP '07, Springer-Verlag
-
Jeong, K., C. Lee, J. Sung, S. Hong, and J. Lim. 2007. Related-key Amplified Boomerang Attacks on the Full-Round Eagle-64, and Eagle-128. ACISP '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4586, pp. 143-157.
-
(2007)
Lecture Notes in Computer Science
, vol.4586
, pp. 143-157
-
-
Jeong, K.1
Lee, C.2
Sung, J.3
Hong, S.4
Lim, J.5
-
29
-
-
84974707257
-
Amplified Boomerang Attacks Against Reduced-Round MARS, and Serpent
-
FSE '00, Springer-Verlag
-
Kelsey, J., T. Kohno, and B. Schneier. 2000. Amplified Boomerang Attacks Against Reduced-Round MARS, and Serpent. FSE '00, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1978, pp. 75-93.
-
(2000)
Lecture Notes in Computer Science
, vol.1978
, pp. 75-93
-
-
Kelsey, J.1
Kohno, T.2
Schneier, B.3
-
30
-
-
67650338267
-
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
Advances in Cryptology, Crypto '96, Springer-Verlag
-
Kelsey, J., B. Schneier, and D. Wagner. 1996. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1109, pp. 237-251.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
31
-
-
0006540774
-
Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
-
ICICS '97, Springer-Verlag
-
Kelsey, J., B. Schneier, and D. Wagner. 1997. Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS '97, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1334, pp. 233-246.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
32
-
-
38149085478
-
Related-Key Rectangle Attacks on Reduced AES-192, and AES-256
-
Springer-Verlag
-
Kim, J., S. Hong, and B. Preneel. 2007. Related-Key Rectangle Attacks on Reduced AES-192, and AES-256. FSE '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4593, pp. 225-241.
-
(2007)
FSE '07, Lecture Notes in Computer Science
, vol.4593
, pp. 225-241
-
-
Kim, J.1
Hong, S.2
Preneel, B.3
-
33
-
-
35048894987
-
The Related-key Rectangle Attacks - Application to SHACAL-1
-
ACISP '04, Springer-Verlag
-
Kim, J., G. Kim, S. Hong, S. Lee, and D. Hong. 2004. The Related-key Rectangle Attacks - Application to SHACAL-1. ACISP '04, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3108, pp. 123-136.
-
(2004)
Lecture Notes in Computer Science
, vol.3108
, pp. 123-136
-
-
Kim, J.1
Kim, G.2
Hong, S.3
Lee, S.4
Hong, D.5
-
34
-
-
68149150311
-
-
Kim, T., J. Kim, S. Hong, and J. Sung. 2008. Linear, and Differential Cryptanalysis of Reduced SMS4 Block Cipher, IACR ePrint Archive, 2008=281.
-
(2008)
Linear, and Differential Cryptanalysis of Reduced SMS4 Block Cipher, IACR ePrint Archive, 2008=281
-
-
Kim, T.1
Kim, J.2
Hong, S.3
Sung, J.4
-
35
-
-
35048904140
-
Related-Key Attacks on Reduced-Rounds of SHACAL-2
-
Progress in Cryptology, Indocrypt '04, Springer-Verlag
-
Kim, J., G. Kim, S. Lee, J. Lim, and J. Song. 2004. Related-Key Attacks on Reduced-Rounds of SHACAL-2. Progress in Cryptology - Indocrypt '04, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3348, pp. 175-190.
-
(2004)
Lecture Notes in Computer Science
, vol.3348
, pp. 175-190
-
-
Kim, J.1
Kim, G.2
Lee, S.3
Lim, J.4
Song, J.5
-
36
-
-
84958740228
-
Amplified Boomerang Attacks Against Reduced-Round SHACAL
-
Advances in Cryptology, Asiacrypt '02, Springer-Verlag
-
Kim, J., D. Moon, W. Lee, S. Hong, S. Lee, and S. Jung. 2002. Amplified Boomerang Attacks Against Reduced-Round SHACAL. Advances in Cryptology - Asiacrypt '02, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2501, pp. 243-253.
-
(2002)
Lecture Notes in Computer Science
, vol.2501
, pp. 243-253
-
-
Kim, J.1
Moon, D.2
Lee, W.3
Hong, S.4
Lee, S.5
Jung, S.6
-
37
-
-
84948949623
-
Truncated, and Higher Order Differentials
-
FSE '94, Springer-Verlag
-
Knudsen, L. R. 1995. Truncated, and Higher Order Differentials. FSE '94, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1008, pp. 196-211.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 196-211
-
-
Knudsen, L.R.1
-
38
-
-
68149165251
-
-
DEAL-a 128-bit Block Cipher, Technical Report 151, Department of Informatics, University of Bergen, Norway, February
-
Knudsen, L. R. 1998. DEAL-a 128-bit Block Cipher, Technical Report 151, Department of Informatics, University of Bergen, Norway, February 1998.
-
(1998)
-
-
Knudsen, L.R.1
-
39
-
-
84949437497
-
Truncated Differentials and Skipjack
-
Advances in Cryptology, Crypto '99, Springer-Verlag
-
Knudsen, L. R., M. J. B. Robshaw, and D. Wagner. 1999. Truncated Differentials and Skipjack. Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1666, pp. 163-180.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 163-180
-
-
Knudsen, L.R.1
Robshaw, M.J.B.2
Wagner, D.3
-
41
-
-
68149160667
-
-
Requirement for Conventional Differentials in Amplified Boomerangs, private communication
-
Kohno, T. 2000. Requirement for Conventional Differentials in Amplified Boomerangs, private communication.
-
(2000)
-
-
Kohno, T.1
-
42
-
-
67049120785
-
Weak-Key Classes of 7-Round MISTY 1, and 2 for Related-Key Amplified Boomerang Attacks
-
Lee, E., J. Kim, D. Hong, C. Lee, J. Sung, S. Hong, and J. Lim. 2008. "Weak-Key Classes of 7-Round MISTY 1, and 2 for Related-Key Amplified Boomerang Attacks," IEICE Transactions, 91-A(2):642-649.
-
(2008)
IEICE Transactions
, vol.91-A
, Issue.2
, pp. 642-649
-
-
Lee, E.1
Kim, J.2
Hong, D.3
Lee, C.4
Sung, J.5
Hong, S.6
Lim, J.7
-
43
-
-
54049122177
-
Security Analysis of the Full-Round DDO-64 Block Cipher
-
Lee, C., J. Kim, S. Hong, J. Sung, and S. Lee. 2008. "Security Analysis of the Full-Round DDO-64 Block Cipher," Journal of Systems, and Software, 81(1):2328-2335.
-
(2008)
Journal of Systems, and Software
, vol.81
, Issue.1
, pp. 2328-2335
-
-
Lee, C.1
Kim, J.2
Hong, S.3
Sung, J.4
Lee, S.5
-
44
-
-
38149125515
-
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
-
ICICS '07, Springer-Verlag
-
Lu, J. 2007. Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. ICICS '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4861, pp. 306-318.
-
(2007)
Lecture Notes in Computer Science
, vol.4861
, pp. 306-318
-
-
Lu, J.1
-
45
-
-
58949086800
-
Related-Key Rectangle Attack on 36 Rounds of the XTEA Block Cipher
-
Lu, J. 2009. "Related-Key Rectangle Attack on 36 Rounds of the XTEA Block Cipher," International Journal of Information Security, 8(1):1-11.
-
(2009)
International Journal of Information Security
, vol.8
, Issue.1
, pp. 1-11
-
-
Lu, J.1
-
46
-
-
68149167456
-
Attacking 44 Rounds of the SHACAL-2 Block Cipher using Related-Key Rectangle Cryptanalysis
-
Lu, J., and J. Kim. 2008. "Attacking 44 Rounds of the SHACAL-2 Block Cipher using Related-Key Rectangle Cryptanalysis," IEICE Transactions, 91-A(9):2588-2596.
-
(2008)
IEICE Transactions
, vol.91-A
, Issue.9
, pp. 2588-2596
-
-
Lu, J.1
Kim, J.2
-
47
-
-
33750265120
-
Related-Key Rectangle Attack on 42-Round SHACAL-2
-
ISC '06, Springer-Verlag
-
Lu, J., J. Kim, N. Keller, and O. Dunkelman. 2006. Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4176, pp. 85-100.
-
(2006)
Lecture Notes in Computer Science
, vol.4176
, pp. 85-100
-
-
Lu, J.1
Kim, J.2
Keller, N.3
Dunkelman, O.4
-
48
-
-
84978788925
-
Differential, and Related-Key Rectangle Attacks on Reduced-Round SHACAL-1
-
Progress in Cryptology, Indocrypt '06, Springer-Verlag
-
Lu, J., J. Kim, N. Keller, and O. Dunkelman. 2006. Differential, and Related-Key Rectangle Attacks on Reduced-Round SHACAL-1. Progress in Cryptology - Indocrypt '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4329, pp. 17-31.
-
(2006)
Lecture Notes in Computer Science
, vol.4329
, pp. 17-31
-
-
Lu, J.1
Kim, J.2
Keller, N.3
Dunkelman, O.4
-
49
-
-
33750018375
-
Related-Key Attacks on the Full-Round Cobra-F64a, and Cobra-F64b
-
SCN '06, Springer-Verlag
-
Lu, J., C. Lee and J. Kim. 2006. Related-Key Attacks on the Full-Round Cobra-F64a, and Cobra-F64b. SCN '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4116, pp. 95-110.
-
(2006)
Lecture Notes in Computer Science
, vol.4116
, pp. 95-110
-
-
Lu, J.1
Lee, C.2
Kim, J.3
-
50
-
-
68149157829
-
A Related-key Attack against 14 Rounds of Skipjack
-
Technical Report, Universitat Mannheim, Manheim, Baden-Württemberg, Germany
-
Lucks, S. and R. Weis. 1999. A Related-key Attack against 14 Rounds of Skipjack, Technical Report, Universitat Mannheim, Manheim, Baden-Württemberg, Germany.
-
(1999)
-
-
Lucks, S.1
Weis, R.2
-
52
-
-
68149159630
-
-
National Institute of Standards, and Technology (NIST). 1998. Skipjack, and KEA Algorithm Specifications. Version 2.
-
National Institute of Standards, and Technology (NIST). 1998. "Skipjack, and KEA Algorithm Specifications. Version 2".
-
-
-
-
53
-
-
68149162098
-
Cryptanalysis of the Advanced Encryption Standard (AES) & Skipjack,
-
M.Eng.Sc. Thesis, Multimedia University, May
-
Phan, R. C.-W. 2001. "Cryptanalysis of the Advanced Encryption Standard (AES) & Skipjack," M.Eng.Sc. Thesis, Multimedia University, May 2001.
-
(2001)
-
-
Phan, R.C.-W.1
-
54
-
-
68149163043
-
Related-key Impossible Differential Cryptanalysis of Skipjack
-
unpublished manuscript
-
Phan, R. C.-W. 2002. Related-key Impossible Differential Cryptanalysis of Skipjack, unpublished manuscript.
-
(2002)
-
-
Phan, R.C.-W.1
-
55
-
-
38149107550
-
Improved Related-Key Attacks on DESX, and DESX
-
Phan, R. C.-W. and A. Shamir. 2008. "Improved Related-Key Attacks on DESX, and DESX," Cryptologia, 32(1):13-22.
-
(2008)
Cryptologia
, vol.32
, Issue.1
, pp. 13-22
-
-
Phan, R.C.-W.1
Shamir, A.2
-
56
-
-
35248849913
-
Markov Truncated Differential Cryptanalysis of Skijjack
-
SAC '02, Springer-Verlag
-
Reichardt, B. and D. Wagner. 2002. Markov Truncated Differential Cryptanalysis of Skijjack. SAC '02, Lecture Notes in Computer Science Springer-Verlag, Vol. 2595, pp. 110-128.
-
(2002)
Lecture Notes in Computer Science
, vol.2595
, pp. 110-128
-
-
Reichardt, B.1
Wagner, D.2
-
58
-
-
84945126868
-
The Boomerang Attack
-
FSE '99, Springer-Verlag
-
Wagner, D. 1999. The Boomerang Attack. FSE '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1636, pp. 156-170.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 156-170
-
-
Wagner, D.1
-
59
-
-
37149011240
-
Related-Key Rectangle Attack on 43-Round SHACAL-2
-
ISPEC '07, Springer-Verlag
-
Wang, G. 2007. Related-Key Rectangle Attack on 43-Round SHACAL-2. ISPEC '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4464, pp. 33-42.
-
(2007)
Lecture Notes in Computer Science
, vol.4464
, pp. 33-42
-
-
Wang, G.1
|