-
1
-
-
24944515451
-
Related-key boomerang and rectangle attacks
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Biham, E., Dunkelman, O., Keller, N.: Related-key boomerang and rectangle attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
2
-
-
33746676877
-
-
Black, J.: The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 328-340. Springer, Heidelberg (2006)
-
Black, J.: The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 328-340. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320 335. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
4
-
-
4243180376
-
The random oracle methodology, revisited
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. J. ACM 51(4), 557-594 (2004)
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
6
-
-
84974678303
-
-
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, 1978, pp. 213-230. Springer, Heidelberg (2000)
-
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2000)
-
-
-
-
7
-
-
84949450111
-
-
Jaulmes, É., Joux, A., Valette, F.: On the security of randomized cbc-mac beyond the birthday paradox limit: A new construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, 2365, pp. 237-251. Springer, Heidelberg (2002)
-
Jaulmes, É., Joux, A., Valette, F.: On the security of randomized cbc-mac beyond the birthday paradox limit: A new construction. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 237-251. Springer, Heidelberg (2002)
-
-
-
-
8
-
-
33645780237
-
Multicollisions in iterated hash functions. Application to cascaded constructions
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Joux, A.: Multicollisions in iterated hash functions. Application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 306-316
-
-
Joux, A.1
-
9
-
-
67650155452
-
-
Khovratiovich, D., Biryukov, A., Nikolić, I.: Speeding up collision search for byte-oriented hash functions. In: CT-RSA 2009. LNCS, 5473, pp. 164-181. Springer, Heidelberg (2009)
-
Khovratiovich, D., Biryukov, A., Nikolić, I.: Speeding up collision search for byte-oriented hash functions. In: CT-RSA 2009. LNCS, vol. 5473, pp. 164-181. Springer, Heidelberg (2009)
-
-
-
-
10
-
-
38149085478
-
-
Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 225-241. Springer, Heidelberg (2007)
-
Kim, J., Hong, S., Preneel, B.: Related-key rectangle attacks on reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
38149128144
-
Known-key distinguishers for some block ciphers
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 315-324
-
-
Knudsen, L.R.1
Rijmen, V.2
-
12
-
-
3042644992
-
-
November 2001
-
National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf
-
FIPS-197: Advanced Encryption Standard
-
-
-
14
-
-
54249127913
-
n) for the xor of two random permutations
-
Safavi-Naini, R, ed, ICITS 2008, Springer, Heidelberg
-
n) for the xor of two random permutations. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 232-248. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5155
, pp. 232-248
-
-
Patarin, J.1
-
15
-
-
70350304464
-
Birthday paradox for multicollisions
-
Suzuki, K., Tonien, D., Kurosawa, K., Toyota, K.: Birthday paradox for multicollisions. IEICE Transactions 91-A(1), 39-45 (2008)
-
(2008)
IEICE Transactions
, vol.91-A
, Issue.1
, pp. 39-45
-
-
Suzuki, K.1
Tonien, D.2
Kurosawa, K.3
Toyota, K.4
|