메뉴 건너뛰기




Volumn 33, Issue 3, 2009, Pages 246-270

Advanced differential-style cryptanalysis of the NSA's Skipjack block Cipher

Author keywords

Analysis; Block ciphers; Boomerang and rectangle attacks; Distinguisher; NSA; Related key miss in the middle attacks; Skipjack

Indexed keywords


EID: 68149099462     PISSN: 01611194     EISSN: 15581586     Source Type: Journal    
DOI: 10.1080/01611190802653228     Document Type: Article
Times cited : (51)

References (59)
  • 1
    • 85006024828 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Advances in Cryptology Eurocrypt '93, Springer-Verlag
    • Biham, E. 1994. New Types of Cryptanalytic Attacks Using Related Keys. Advances in Cryptology Eurocrypt '93, Lecture Notes in Computer Science, Springer-Verlag, Vol. 765, pp. 398-409.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 398-409
    • Biham, E.1
  • 2
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Biham, E. 1994. "New Types of Cryptanalytic Attacks Using Related Keys," Journal of Cryptology, 7:229-246.
    • (1994) Journal of Cryptology , vol.7 , pp. 229-246
    • Biham, E.1
  • 3
    • 84949222471 scopus 로고    scopus 로고
    • Initial Observations on Skipjack - Cryptanalysis of Skipjack-3XOR
    • SAC '98, Springer-Verlag
    • Biham, E., A. Biryukov, O. Dunkelman, E. Richardson, and A. Shamir. 1998. Initial Observations on Skipjack - Cryptanalysis of Skipjack-3XOR. SAC '98, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1556, pp. 362-370.
    • (1998) Lecture Notes in Computer Science , vol.1556 , pp. 362-370
    • Biham, E.1    Biryukov, A.2    Dunkelman, O.3    Richardson, E.4    Shamir, A.5
  • 4
    • 84957634424 scopus 로고    scopus 로고
    • Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials
    • Advances in Cryptology-Eurocrypt '99, Springer-Verlag
    • Biham, E., A. Biryukov, and A. Shamir. 1999. Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials. Advances in Cryptology-Eurocrypt '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1592, pp. 12-23.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 12-23
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 5
    • 84957694360 scopus 로고    scopus 로고
    • Miss in the Middle Attacks on IDEA, Khufu, and Khafre
    • FSE '99, Springer-Verlag
    • Biham, E., A. Biryukov, and A. Shamir. 1999. Miss in the Middle Attacks on IDEA, Khufu, and Khafre. FSE '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1636, pp. 124-138.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 124-138
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 6
    • 84945132264 scopus 로고    scopus 로고
    • The Rectangle Attack-Rectangling the Serpent
    • Advances in Cryptology, Eurocrypt '01, Springer-Verlag
    • Biham, E., O. Dunkelman, and N. Keller. 2001. The Rectangle Attack-Rectangling the Serpent. Advances in Cryptology - Eurocrypt '01, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2045, pp. 340-357.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 340-357
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 7
    • 84949456804 scopus 로고    scopus 로고
    • New Results on Boomerang, and Rectangle Attacks
    • FSE '02, Springer-Verlag
    • Biham, E., O. Dunkelman, and N. Keller. 2002. New Results on Boomerang, and Rectangle Attacks. FSE '02, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2365, pp. 1-16.
    • (2002) Lecture Notes in Computer Science , vol.2365 , pp. 1-16
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 8
    • 0242570832 scopus 로고    scopus 로고
    • Rectangle Attacks on 49-Round SHACAL-1
    • FSE '03, Springer-Verlag
    • Biham, E., O. Dunkelman, and N. Keller. 2003. Rectangle Attacks on 49-Round SHACAL-1. FSE '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2887, pp. 22-35.
    • (2003) Lecture Notes in Computer Science , vol.2887 , pp. 22-35
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 9
    • 24944515451 scopus 로고    scopus 로고
    • Related-Key Boomerang, and Rectangle Attacks
    • Advances in Cryptology, Eurocrypt '05, Springer-Verlag
    • Biham, E., O. Dunkelman, and N. Keller. 2005. Related-Key Boomerang, and Rectangle Attacks. Advances in Cryptology - Eurocrypt '05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3494, pp. 507-525.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 507-525
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 10
    • 33646781279 scopus 로고    scopus 로고
    • A Related-Key Rectangle Attack on the Full KASUMI
    • Advances in Cryptology, Asiacrypt'05, Springer-Verlag
    • Biham, E., O. Dunkelman, and N. Keller. 2005. A Related-Key Rectangle Attack on the Full KASUMI. Advances in Cryptology - Asiacrypt'05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3788, pp. 443-461.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 443-461
    • Biham, E.1    Dunkelman, O.2    Keller, N.3
  • 12
    • 84903595110 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems (Extended Abstract)
    • Advances in Cryptology, Crypto '90, Springer-Verlag
    • Biham, E. and A. Shamir. 1991. Differential Cryptanalysis of DES-like Cryptosystems (Extended Abstract). Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science, Springer-Verlag, Vol. 537, pp. 2-21.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 13
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • Biham, E. and A. Shamir. 1991. "Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, 4(1):3-72.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 14
    • 24144494187 scopus 로고    scopus 로고
    • The Boomerang Attack on 5, and 6-round Reduced AES
    • Springer-Verlag
    • Biryukov, A. 2004. The Boomerang Attack on 5, and 6-round Reduced AES. AES4, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3373, pp. 1-5.
    • (2004) AES4, Lecture Notes in Computer Science , vol.3373 , pp. 1-5
    • Biryukov, A.1
  • 15
    • 35248831758 scopus 로고    scopus 로고
    • Cryptanalysis of SAFER
    • Advances in Cryptology, Crypto '03, Springer-Verlag
    • Biryukov, A., C. De Canniere, and G. Dellkrantz. 2003. Cryptanalysis of SAFER. Advances in Cryptology - Crypto '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2729, pp. 195-211.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 195-211
    • Biryukov, A.1    De Canniere, C.2    Dellkrantz, G.3
  • 18
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Advances n Cryptology, Eurocrypt '00, Springer-Verlag
    • Biryukov, A. and D. Wagner. 2000. Advanced Slide Attacks. Advances n Cryptology - Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1807, pp. 589-606.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 21
    • 38149032323 scopus 로고    scopus 로고
    • Related-Key Rectangle Attack on the Full SHACAL-1
    • SAC '06, Springer-Verlag
    • Dunkelman, O., N. Keller, J. Kim. 2006. Related-Key Rectangle Attack on the Full SHACAL-1. SAC '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4356, pp. 28-44.
    • (2006) Lecture Notes in Computer Science , vol.4356 , pp. 28-44
    • Dunkelman, O.1    Keller, N.2    Kim, J.3
  • 22
    • 58549086813 scopus 로고    scopus 로고
    • New Related-Key Boomerang Attacks on AES
    • Progress in Cryptology, Indocrypt '08, Springer-Verlag
    • Gorski, M. and S. Lucks. 2008. New Related-Key Boomerang Attacks on AES. Progress in Cryptology - Indocrypt '08, Lecture Notes in Computer Science, Springer-Verlag, Vol. 5365, pp. 266-278.
    • (2008) Lecture Notes in Computer Science , vol.5365 , pp. 266-278
    • Gorski, M.1    Lucks, S.2
  • 23
    • 84958960240 scopus 로고    scopus 로고
    • Flaws in the Differential Cryptanalysis of Skipjack
    • FSE '01, Springer-Verlag
    • Granboulan, L. 2001. Flaws in the Differential Cryptanalysis of Skipjack. FSE '01, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2355, pp. 328-335.
    • (2001) Lecture Notes in Computer Science , vol.2355 , pp. 328-335
    • Granboulan, L.1
  • 24
    • 26444515034 scopus 로고    scopus 로고
    • Related-key Rectangle Attacks on Reduced Versions of SHACAL-1, and AES-192
    • Springer-Verlag
    • Hong, S., J. Kim, G. Kim, S. Lee, and B. Preneel. 2005. Related-key Rectangle Attacks on Reduced Versions of SHACAL-1, and AES-192. FSE '05, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3557, pp. 368-383.
    • (2005) FSE '05, Lecture Notes in Computer Science , vol.3557 , pp. 368-383
    • Hong, S.1    Kim, J.2    Kim, G.3    Lee, S.4    Preneel, B.5
  • 25
    • 68149180409 scopus 로고    scopus 로고
    • Hui, L. C. K., X. Y. Wang, K. P. Chow, W. W. Tsang, C. F. Chong, and H. W. Chan. 2002. The Differential Analysis of Reduced Skipjack Variants, Chinacrypt 02.
    • Hui, L. C. K., X. Y. Wang, K. P. Chow, W. W. Tsang, C. F. Chong, and H. W. Chan. 2002. The Differential Analysis of Reduced Skipjack Variants, Chinacrypt 02.
  • 26
    • 84949475951 scopus 로고    scopus 로고
    • Saturation Attacks on Reduced Round Skipjack
    • FSE '02, Springer-Verlag
    • Hwang, K., W. Lee, S. Lee, S. Lee, and J. Lim. 2002. Saturation Attacks on Reduced Round Skipjack. FSE '02, Lecture Notes in Computer Science Springer-Verlag, Vol. 2365, pp. 100-111.
    • (2002) Lecture Notes in Computer Science , vol.2365 , pp. 100-111
    • Hwang, K.1    Lee, W.2    Lee, S.3    Lee, S.4    Lim, J.5
  • 27
    • 24944480579 scopus 로고    scopus 로고
    • Related-key Differential Cryptanalysis of 192-bit Key AES Variants
    • SAC '03, Springer-Verlag
    • Jakimoski, G., and Y. Desmedt. 2003. Related-key Differential Cryptanalysis of 192-bit Key AES Variants. SAC '03, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3006, pp. 208-221.
    • (2003) Lecture Notes in Computer Science , vol.3006 , pp. 208-221
    • Jakimoski, G.1    Desmedt, Y.2
  • 28
    • 38149081304 scopus 로고    scopus 로고
    • Related-key Amplified Boomerang Attacks on the Full-Round Eagle-64, and Eagle-128
    • ACISP '07, Springer-Verlag
    • Jeong, K., C. Lee, J. Sung, S. Hong, and J. Lim. 2007. Related-key Amplified Boomerang Attacks on the Full-Round Eagle-64, and Eagle-128. ACISP '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4586, pp. 143-157.
    • (2007) Lecture Notes in Computer Science , vol.4586 , pp. 143-157
    • Jeong, K.1    Lee, C.2    Sung, J.3    Hong, S.4    Lim, J.5
  • 29
    • 84974707257 scopus 로고    scopus 로고
    • Amplified Boomerang Attacks Against Reduced-Round MARS, and Serpent
    • FSE '00, Springer-Verlag
    • Kelsey, J., T. Kohno, and B. Schneier. 2000. Amplified Boomerang Attacks Against Reduced-Round MARS, and Serpent. FSE '00, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1978, pp. 75-93.
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 75-93
    • Kelsey, J.1    Kohno, T.2    Schneier, B.3
  • 30
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • Advances in Cryptology, Crypto '96, Springer-Verlag
    • Kelsey, J., B. Schneier, and D. Wagner. 1996. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1109, pp. 237-251.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 31
    • 0006540774 scopus 로고    scopus 로고
    • Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • ICICS '97, Springer-Verlag
    • Kelsey, J., B. Schneier, and D. Wagner. 1997. Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. ICICS '97, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1334, pp. 233-246.
    • (1997) Lecture Notes in Computer Science , vol.1334 , pp. 233-246
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 32
    • 38149085478 scopus 로고    scopus 로고
    • Related-Key Rectangle Attacks on Reduced AES-192, and AES-256
    • Springer-Verlag
    • Kim, J., S. Hong, and B. Preneel. 2007. Related-Key Rectangle Attacks on Reduced AES-192, and AES-256. FSE '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4593, pp. 225-241.
    • (2007) FSE '07, Lecture Notes in Computer Science , vol.4593 , pp. 225-241
    • Kim, J.1    Hong, S.2    Preneel, B.3
  • 33
    • 35048894987 scopus 로고    scopus 로고
    • The Related-key Rectangle Attacks - Application to SHACAL-1
    • ACISP '04, Springer-Verlag
    • Kim, J., G. Kim, S. Hong, S. Lee, and D. Hong. 2004. The Related-key Rectangle Attacks - Application to SHACAL-1. ACISP '04, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3108, pp. 123-136.
    • (2004) Lecture Notes in Computer Science , vol.3108 , pp. 123-136
    • Kim, J.1    Kim, G.2    Hong, S.3    Lee, S.4    Hong, D.5
  • 35
    • 35048904140 scopus 로고    scopus 로고
    • Related-Key Attacks on Reduced-Rounds of SHACAL-2
    • Progress in Cryptology, Indocrypt '04, Springer-Verlag
    • Kim, J., G. Kim, S. Lee, J. Lim, and J. Song. 2004. Related-Key Attacks on Reduced-Rounds of SHACAL-2. Progress in Cryptology - Indocrypt '04, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3348, pp. 175-190.
    • (2004) Lecture Notes in Computer Science , vol.3348 , pp. 175-190
    • Kim, J.1    Kim, G.2    Lee, S.3    Lim, J.4    Song, J.5
  • 36
    • 84958740228 scopus 로고    scopus 로고
    • Amplified Boomerang Attacks Against Reduced-Round SHACAL
    • Advances in Cryptology, Asiacrypt '02, Springer-Verlag
    • Kim, J., D. Moon, W. Lee, S. Hong, S. Lee, and S. Jung. 2002. Amplified Boomerang Attacks Against Reduced-Round SHACAL. Advances in Cryptology - Asiacrypt '02, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2501, pp. 243-253.
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 243-253
    • Kim, J.1    Moon, D.2    Lee, W.3    Hong, S.4    Lee, S.5    Jung, S.6
  • 37
    • 84948949623 scopus 로고
    • Truncated, and Higher Order Differentials
    • FSE '94, Springer-Verlag
    • Knudsen, L. R. 1995. Truncated, and Higher Order Differentials. FSE '94, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1008, pp. 196-211.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 196-211
    • Knudsen, L.R.1
  • 38
    • 68149165251 scopus 로고    scopus 로고
    • DEAL-a 128-bit Block Cipher, Technical Report 151, Department of Informatics, University of Bergen, Norway, February
    • Knudsen, L. R. 1998. DEAL-a 128-bit Block Cipher, Technical Report 151, Department of Informatics, University of Bergen, Norway, February 1998.
    • (1998)
    • Knudsen, L.R.1
  • 39
    • 84949437497 scopus 로고    scopus 로고
    • Truncated Differentials and Skipjack
    • Advances in Cryptology, Crypto '99, Springer-Verlag
    • Knudsen, L. R., M. J. B. Robshaw, and D. Wagner. 1999. Truncated Differentials and Skipjack. Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1666, pp. 163-180.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 163-180
    • Knudsen, L.R.1    Robshaw, M.J.B.2    Wagner, D.3
  • 41
    • 68149160667 scopus 로고    scopus 로고
    • Requirement for Conventional Differentials in Amplified Boomerangs, private communication
    • Kohno, T. 2000. Requirement for Conventional Differentials in Amplified Boomerangs, private communication.
    • (2000)
    • Kohno, T.1
  • 42
    • 67049120785 scopus 로고    scopus 로고
    • Weak-Key Classes of 7-Round MISTY 1, and 2 for Related-Key Amplified Boomerang Attacks
    • Lee, E., J. Kim, D. Hong, C. Lee, J. Sung, S. Hong, and J. Lim. 2008. "Weak-Key Classes of 7-Round MISTY 1, and 2 for Related-Key Amplified Boomerang Attacks," IEICE Transactions, 91-A(2):642-649.
    • (2008) IEICE Transactions , vol.91-A , Issue.2 , pp. 642-649
    • Lee, E.1    Kim, J.2    Hong, D.3    Lee, C.4    Sung, J.5    Hong, S.6    Lim, J.7
  • 43
    • 54049122177 scopus 로고    scopus 로고
    • Security Analysis of the Full-Round DDO-64 Block Cipher
    • Lee, C., J. Kim, S. Hong, J. Sung, and S. Lee. 2008. "Security Analysis of the Full-Round DDO-64 Block Cipher," Journal of Systems, and Software, 81(1):2328-2335.
    • (2008) Journal of Systems, and Software , vol.81 , Issue.1 , pp. 2328-2335
    • Lee, C.1    Kim, J.2    Hong, S.3    Sung, J.4    Lee, S.5
  • 44
    • 38149125515 scopus 로고    scopus 로고
    • Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard
    • ICICS '07, Springer-Verlag
    • Lu, J. 2007. Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. ICICS '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4861, pp. 306-318.
    • (2007) Lecture Notes in Computer Science , vol.4861 , pp. 306-318
    • Lu, J.1
  • 45
    • 58949086800 scopus 로고    scopus 로고
    • Related-Key Rectangle Attack on 36 Rounds of the XTEA Block Cipher
    • Lu, J. 2009. "Related-Key Rectangle Attack on 36 Rounds of the XTEA Block Cipher," International Journal of Information Security, 8(1):1-11.
    • (2009) International Journal of Information Security , vol.8 , Issue.1 , pp. 1-11
    • Lu, J.1
  • 46
    • 68149167456 scopus 로고    scopus 로고
    • Attacking 44 Rounds of the SHACAL-2 Block Cipher using Related-Key Rectangle Cryptanalysis
    • Lu, J., and J. Kim. 2008. "Attacking 44 Rounds of the SHACAL-2 Block Cipher using Related-Key Rectangle Cryptanalysis," IEICE Transactions, 91-A(9):2588-2596.
    • (2008) IEICE Transactions , vol.91-A , Issue.9 , pp. 2588-2596
    • Lu, J.1    Kim, J.2
  • 47
    • 33750265120 scopus 로고    scopus 로고
    • Related-Key Rectangle Attack on 42-Round SHACAL-2
    • ISC '06, Springer-Verlag
    • Lu, J., J. Kim, N. Keller, and O. Dunkelman. 2006. Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4176, pp. 85-100.
    • (2006) Lecture Notes in Computer Science , vol.4176 , pp. 85-100
    • Lu, J.1    Kim, J.2    Keller, N.3    Dunkelman, O.4
  • 48
    • 84978788925 scopus 로고    scopus 로고
    • Differential, and Related-Key Rectangle Attacks on Reduced-Round SHACAL-1
    • Progress in Cryptology, Indocrypt '06, Springer-Verlag
    • Lu, J., J. Kim, N. Keller, and O. Dunkelman. 2006. Differential, and Related-Key Rectangle Attacks on Reduced-Round SHACAL-1. Progress in Cryptology - Indocrypt '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4329, pp. 17-31.
    • (2006) Lecture Notes in Computer Science , vol.4329 , pp. 17-31
    • Lu, J.1    Kim, J.2    Keller, N.3    Dunkelman, O.4
  • 49
    • 33750018375 scopus 로고    scopus 로고
    • Related-Key Attacks on the Full-Round Cobra-F64a, and Cobra-F64b
    • SCN '06, Springer-Verlag
    • Lu, J., C. Lee and J. Kim. 2006. Related-Key Attacks on the Full-Round Cobra-F64a, and Cobra-F64b. SCN '06, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4116, pp. 95-110.
    • (2006) Lecture Notes in Computer Science , vol.4116 , pp. 95-110
    • Lu, J.1    Lee, C.2    Kim, J.3
  • 50
    • 68149157829 scopus 로고    scopus 로고
    • A Related-key Attack against 14 Rounds of Skipjack
    • Technical Report, Universitat Mannheim, Manheim, Baden-Württemberg, Germany
    • Lucks, S. and R. Weis. 1999. A Related-key Attack against 14 Rounds of Skipjack, Technical Report, Universitat Mannheim, Manheim, Baden-Württemberg, Germany.
    • (1999)
    • Lucks, S.1    Weis, R.2
  • 52
    • 68149159630 scopus 로고    scopus 로고
    • National Institute of Standards, and Technology (NIST). 1998. Skipjack, and KEA Algorithm Specifications. Version 2.
    • National Institute of Standards, and Technology (NIST). 1998. "Skipjack, and KEA Algorithm Specifications. Version 2".
  • 53
    • 68149162098 scopus 로고    scopus 로고
    • Cryptanalysis of the Advanced Encryption Standard (AES) & Skipjack,
    • M.Eng.Sc. Thesis, Multimedia University, May
    • Phan, R. C.-W. 2001. "Cryptanalysis of the Advanced Encryption Standard (AES) & Skipjack," M.Eng.Sc. Thesis, Multimedia University, May 2001.
    • (2001)
    • Phan, R.C.-W.1
  • 54
    • 68149163043 scopus 로고    scopus 로고
    • Related-key Impossible Differential Cryptanalysis of Skipjack
    • unpublished manuscript
    • Phan, R. C.-W. 2002. Related-key Impossible Differential Cryptanalysis of Skipjack, unpublished manuscript.
    • (2002)
    • Phan, R.C.-W.1
  • 55
    • 38149107550 scopus 로고    scopus 로고
    • Improved Related-Key Attacks on DESX, and DESX
    • Phan, R. C.-W. and A. Shamir. 2008. "Improved Related-Key Attacks on DESX, and DESX," Cryptologia, 32(1):13-22.
    • (2008) Cryptologia , vol.32 , Issue.1 , pp. 13-22
    • Phan, R.C.-W.1    Shamir, A.2
  • 56
    • 35248849913 scopus 로고    scopus 로고
    • Markov Truncated Differential Cryptanalysis of Skijjack
    • SAC '02, Springer-Verlag
    • Reichardt, B. and D. Wagner. 2002. Markov Truncated Differential Cryptanalysis of Skijjack. SAC '02, Lecture Notes in Computer Science Springer-Verlag, Vol. 2595, pp. 110-128.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 110-128
    • Reichardt, B.1    Wagner, D.2
  • 58
    • 84945126868 scopus 로고    scopus 로고
    • The Boomerang Attack
    • FSE '99, Springer-Verlag
    • Wagner, D. 1999. The Boomerang Attack. FSE '99, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1636, pp. 156-170.
    • (1999) Lecture Notes in Computer Science , vol.1636 , pp. 156-170
    • Wagner, D.1
  • 59
    • 37149011240 scopus 로고    scopus 로고
    • Related-Key Rectangle Attack on 43-Round SHACAL-2
    • ISPEC '07, Springer-Verlag
    • Wang, G. 2007. Related-Key Rectangle Attack on 43-Round SHACAL-2. ISPEC '07, Lecture Notes in Computer Science, Springer-Verlag, Vol. 4464, pp. 33-42.
    • (2007) Lecture Notes in Computer Science , vol.4464 , pp. 33-42
    • Wang, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.