-
1
-
-
72449132148
-
-
Barreto, P.S.L.M., Rijmen, V.: The Whirlpool Hashing Function. Submitted to NESSIE (September 2000), http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html (2008/12/11) (revised May 2003)
-
Barreto, P.S.L.M., Rijmen, V.: The Whirlpool Hashing Function. Submitted to NESSIE (September 2000), http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html (2008/12/11) (revised May 2003)
-
-
-
-
2
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Menezes, A, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
50449107349
-
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
4
-
-
84946823597
-
The Wide Trail Design Strategy
-
Honary, B, ed, Cryptography and Coding 2001, Springer, Heidelberg
-
Daemen, J., Rijmen, V.: The Wide Trail Design Strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 222-238. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2260
, pp. 222-238
-
-
Daemen, J.1
Rijmen, V.2
-
5
-
-
0038218554
-
-
Information Security and Cryptography. Springer, Heidelberg , ISBN 3-540-42580-2
-
Daemen, J., Rijmen, V.: The Design of Rijndael. Information Security and Cryptography. Springer, Heidelberg (2002), ISBN 3-540-42580-2
-
(2002)
The Design of Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
6
-
-
38549144112
-
-
De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, 4876, pp. 56-73. Springer, Heidelberg (2007)
-
De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M.J. (eds.) SAC 2007. LNCS, vol. 4876, pp. 56-73. Springer, Heidelberg (2007)
-
-
-
-
7
-
-
38049183978
-
Finding SHA-1 Characteristics: General Results and Applications
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 1-20
-
-
De Cannière, C.1
Rechberger, C.2
-
8
-
-
72449182451
-
-
Filho, D.G., Barreto, P.S., Rijmen, V.: The Maelstrom-0 hash function. In: SBSeg 2006 (2006)
-
Filho, D.G., Barreto, P.S., Rijmen, V.: The Maelstrom-0 hash function. In: SBSeg 2006 (2006)
-
-
-
-
9
-
-
0042156782
-
Classroom Notes: Matrices over a Finite Field
-
Fisher, S.D.: Classroom Notes: Matrices over a Finite Field. Amer. Math. Monthly 73(6), 639-641 (1966)
-
(1966)
Amer. Math. Monthly
, vol.73
, Issue.6
, pp. 639-641
-
-
Fisher, S.D.1
-
10
-
-
84948949623
-
-
Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, 1008, pp. 196-211. Springer, Heidelberg (1995)
-
Knudsen, L.R.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196-211. Springer, Heidelberg (1995)
-
-
-
-
11
-
-
70350384894
-
Non-random properties of reduced-round Whirlpool
-
NESSIE public report, NES/DOC/UIB/WP5/017/1
-
Knudsen, L.R.: Non-random properties of reduced-round Whirlpool. NESSIE public report, NES/DOC/UIB/WP5/017/1 (2002)
-
(2002)
-
-
Knudsen, L.R.1
-
12
-
-
38149128144
-
Known-key distinguishers for some block ciphers
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 315-324
-
-
Knudsen, L.R.1
Rijmen, V.2
-
13
-
-
0003600298
-
-
2nd edn, Cambridge University Press, Cambridge , with a foreword by P. M. Cohn
-
Lidl, R., Niederreiter, H.: Finite Fields, Encyclopedia of Mathematics and its Applications, 2nd edn., vol. 20. Cambridge University Press, Cambridge (1997); with a foreword by P. M. Cohn
-
(1997)
Finite Fields, Encyclopedia of Mathematics and its Applications
, vol.20
-
-
Lidl, R.1
Niederreiter, H.2
-
14
-
-
70549103557
-
Rebound Attack on the Full LANE Compression Function
-
Matsui, M, ed, ASIACRYPT 2009, Springer, Heidelberg
-
Matusiewicz, K., Naya-Plasencia, M., Nikolić, I., Sasaki, Y., Schläffer, M.: Rebound Attack on the Full LANE Compression Function. In:Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 106-125. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 106-125
-
-
Matusiewicz, K.1
Naya-Plasencia, M.2
Nikolić, I.3
Sasaki, Y.4
Schläffer, M.5
-
15
-
-
70549111559
-
-
Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, 5867, pp. 16-35. Springer, Heidelberg (2009)
-
Mendel, F., Peyrin, T., Rechberger, C., Schläffer, M.: Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16-35. Springer, Heidelberg (2009)
-
-
-
-
16
-
-
70350398631
-
-
Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, 5665, pp. 260-276. Springer, Heidelberg (2009)
-
Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
-
-
-
-
17
-
-
38149133737
-
Cryptanalysis of the Tiger Hash Function
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 536-550
-
-
Mendel, F.1
Rijmen, V.2
-
18
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997), http://www.cacr.math.uwaterloo.ca/ hac/
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
19
-
-
72449142978
-
-
National Institute of Standards and Technology: FIPS PUB 197, Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, U.S. Department of Commerce (November 2001)
-
National Institute of Standards and Technology: FIPS PUB 197, Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, U.S. Department of Commerce (November 2001)
-
-
-
-
21
-
-
38149068987
-
Cryptanalysis of Grindahl
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 551-567. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 551-567
-
-
Peyrin, T.1
-
22
-
-
0002470563
-
A remark on Stirling's formula
-
Robbins, H.: A remark on Stirling's formula. Amer. Math. Monthly 62, 26-29 (1955)
-
(1955)
Amer. Math. Monthly
, vol.62
, pp. 26-29
-
-
Robbins, H.1
-
23
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28, 656-715 (1949)
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
24
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
25
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
26
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|