-
1
-
-
84949446286
-
-
Fast Software Encryption, Springer-Verlag, to appear
-
P. Barreto, V. Rijmen, J. Nakahara, B. Preneel, J. Vandewalle, and H.Y. Kim. “Improved SQUARE attacks against reduced-round HIEROCRYPT”. Fast Software Encryption 2001, Springer-Verlag, to appear.
-
(2001)
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
-
-
Barreto, P.1
Rijmen, V.2
Nakahara, J.3
Preneel, B.4
Vandewalle, J.5
Kim, H.Y.6
-
2
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
J. Stern, editor, Springer Verlag
-
E. Biham, A. Biryukov, A. Shamir, “Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials,” In J. Stern, editor, Advances in Cryptology: EUROCRYPT’99, LNCS 1592, pp. 12–23. Springer Verlag, 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT’99, LNCS 1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84945121465
-
Structural Cryptanalysis of SASAS
-
Springer-Verlag
-
A. Biryukov, A. Shamir, “Structural Cryptanalysis of SASAS,” Advances in Cryptology - EUROCRYPT 2001, LNCS 2045, Springer-Verlag, pp. 394–405, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, LNCS 2045
, pp. 394-405
-
-
Biryukov, A.1
Shamir, A.2
-
5
-
-
84947444236
-
The block cipher Square
-
E. Biham, editor, Haifa, Israel, January 1997, LNCS 1267, Springer Verlag
-
J. Daemen, L. Knudsen, and V. Rijmen. The block cipher Square. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 149–165. Springer Verlag, 1997.
-
(1997)
Fast Software Encryption, Fourth International Workshop
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.2
Rijmen, V.3
-
6
-
-
0348238301
-
Linear Frameworks for Block Ciphers
-
J. Daemen, L.R. Knudsen, and V. Rijmen, “Linear Frameworks for Block Ciphers,” Designs, Codes and Cryptography, Volume 22, No 1, 2001, pp. 65-87.
-
(2001)
Designs, Codes and Cryptography
, vol.22
, Issue.1
, pp. 65-87
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
7
-
-
32644441738
-
-
AES Round 1 Technical Evaluation CD-1: Documentation, National Institute of Standards and Technology
-
J. Daemen, V. Rijmen, “AES Proposal: Rijndael,” AES Round 1 Technical Evaluation CD-1: Documentation, National Institute of Standards and Technology, Aug 1998.
-
(1998)
AES Proposal: Rijndael,
-
-
Daemen, J.1
Rijmen, V.2
-
8
-
-
84957702273
-
Attack on Six Rounds of Crypton
-
L. Knudsen, editor, Rome, Italy, March 1999, LNCS 1636, Springer Verlag
-
C. D’Halluin, G. Bijnens, V. Rijmen, and B. Preneel. Attack on Six Rounds of Crypton. In L. Knudsen, editor, Fast Software Encryption, Sixth International Workshop, Rome, Italy, March 1999, LNCS 1636, pages 46–59. Springer Verlag, 1999.
-
(1999)
Fast Software Encryption, Sixth International Workshop
, pp. 46-59
-
-
D’Halluin, C.1
Bijnens, G.2
Rijmen, V.3
Preneel, B.4
-
9
-
-
84974678303
-
Improved cryptanalysis of Rijndael
-
B. Schneier, editor, New York, USA, April 2000, LNCS 1978, Springer Verlag
-
N. Ferguson, J. Kelsey, B. Schneier, M. Stay, D. Wagner, and D. Whiting. Improved cryptanalysis of Rijndael. In B. Schneier, editor, Fast Software Encryption, 7th International Workshop, FSE 2000, New York, USA, April 2000, LNCS 1978, pages 213–230. Springer Verlag, 2001.
-
(2001)
Fast Software Encryption, 7Th International Workshop, FSE 2000
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Schneier, B.3
Stay, M.4
Wagner, D.5
Whiting, D.6
-
12
-
-
0032679615
-
Integral cryptanalysis of SAFER+
-
Aug
-
Y. Hu, Y. Zhang, and G. Xiao, “Integral cryptanalysis of SAFER+”, Electronics Letters, vol.35, (no.17), IEE, 19 Aug. 1999, p.1458-1459.
-
(1999)
Electronics Letters
, vol.35
, Issue.19
, pp. 1458-1459
-
-
Hu, Y.1
Zhang, Y.2
Xiao, G.3
-
13
-
-
84947929289
-
The interpolation attack on block ciphers
-
E. Biham, editor, Haifa, Israel, January 1997, LNCS 1267, Springer Verlag
-
T. Jakobsen and L. Knudsen. The interpolation attack on block ciphers. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 28–40. Springer Verlag, 1997.
-
(1997)
Fast Software Encryption, Fourth International Workshop
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.2
-
14
-
-
84957694404
-
Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree
-
H. Krawczyk, editor, Springer Verlag
-
T. Jakobsen, Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. In H. Krawczyk, editor, Advances in Cryptology: CRYPTO’98, LNCS 1462, pages 212–222. Springer Verlag, 1998.
-
(1998)
Advances in Cryptology: CRYPTO’98, LNCS 1462
, pp. 212-222
-
-
Jakobsen, T.1
-
15
-
-
84958958039
-
Truncated differentials of SAFER
-
Gollmann D., editor, Springer Verlag
-
L.R. Knudsen and T. Berson. Truncated differentials of SAFER. In Gollmann D., editor, Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, LNCS 1039, pages 15–26. Springer Verlag, 1995.
-
(1995)
Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, LNCS 1039
, pp. 15-26
-
-
Knudsen, L.R.1
Berson, T.2
-
16
-
-
84948949623
-
Truncated and higher order differentials
-
B. Preneel, editor, Leuven, Belgium, LNCS 1008, Springer Verlag
-
L.R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption - Second International Workshop, Leuven, Belgium, LNCS 1008, pages 196–211. Springer Verlag, 1995.
-
(1995)
Fast Software Encryption - Second International Workshop
, pp. 196-211
-
-
Knudsen, L.R.1
-
18
-
-
0005268717
-
A Detailed Analysis of SAFER K
-
Springer-Verlag
-
L.R. Knudsen, “A Detailed Analysis of SAFER K”, Journal of Cryptology, vol.3, no.4, Springer-Verlag, 2000, pp.417–436.
-
(2000)
Journal of Cryptology
, vol.3
, Issue.4
, pp. 417-436
-
-
Knudsen, L.R.1
-
19
-
-
84945134259
-
Cryptanalysis of reduced-round MISTY
-
B. Pfitzmann, editor, Springer Verlag
-
U. Kuhn. Cryptanalysis of reduced-round MISTY. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT’2001, LNCS 2045, pages 325–339. Springer Verlag, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT’2001, LNCS 2045
, pp. 325-339
-
-
Kuhn, U.1
-
20
-
-
84949458439
-
Improved Cryptanalysis of MISTY1
-
U. Kuhn, “Improved Cryptanalysis of MISTY1,” These proceedings.
-
These Proceedings
-
-
Kuhn, U.1
-
21
-
-
0041863249
-
Higher Order Derivations and Differential Cryptanalysis
-
Kluwer Academic Publishers
-
X. Lai, “Higher Order Derivations and Differential Cryptanalysis,” Communications and Cryptography: Two Sides of One Tapestry, Kluwer Academic Publishers, 1994, pp. 227–233.
-
(1994)
Communications and Cryptography: Two Sides of One Tapestry
, pp. 227-233
-
-
Lai, X.1
-
23
-
-
85019318892
-
-
In R. Anderson, editor, Cambridge, U.K., LNCS 809, Springer Verlag
-
J.L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In R. Anderson, editor, Fast Software Encryption - Proc. Cambridge Security Workshop, Cambridge, U.K., LNCS 809, pages 1–17. Springer Verlag, 1994.
-
(1994)
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
, pp. 1-17
-
-
Massey, J.L.1
-
24
-
-
84947904428
-
New block encryption algorithm MISTY
-
E. Biham, editor, Haifa, Israel, January 1997, LNCS 1267, Springer Verlag
-
M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption, Fourth International Workshop, Haifa, Israel, January 1997, LNCS 1267, pages 54–68. Springer Verlag, 1997.
-
(1997)
Fast Software Encryption, Fourth International Workshop
, pp. 54-68
-
-
Matsui, M.1
-
25
-
-
35048871471
-
SQUARE Attacks Against Reduced-Round PES and IDEA Block Ciphers
-
Report 2001/068
-
J. Nakahara, P.S.L.M. Barreto, B. Preneel, J. Vandewalle, H.Y. Kim, “SQUARE Attacks Against Reduced-Round PES and IDEA Block Ciphers”, IACR Cryptology ePrint Archive, Report 2001/068, 2001.
-
(2001)
IACR Cryptology Eprint Archive
-
-
Nakahara, J.1
Barreto, P.2
Preneel, B.3
Vandewalle, J.4
Kim, H.Y.5
-
26
-
-
84955568918
-
Generalized Feistel networks
-
Springer Verlag
-
K. Nyberg. Generalized Feistel networks. In Kwangjo Kim and Tsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT’96, LNCS 1163, pages 91–104. Springer Verlag, 1996.
-
(1996)
Kwangjo Kim and Tsutomu Matsumoto, Editors, Advances in Cryptology - ASIACRYPT’96, LNCS 1163
, pp. 91-104
-
-
Nyberg, K.1
-
27
-
-
84958979426
-
The cipher SHARK
-
Gollmann D., editor, Cambridge, UK, February 1996, LNCS 1039, Springer Verlag
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win. The cipher SHARK. In Gollmann D., editor, Fast Software Encryption, Third International Workshop, Cambridge, UK, February 1996, LNCS 1039, pages 99–112. Springer Verlag, 1996.
-
(1996)
Fast Software Encryption, Third International Workshop,
, pp. 99-112
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
De Win, E.5
-
28
-
-
0030686751
-
On Non-Pseudorandomness from Block Ciphers with Provable Immunity against Linear Cryptanalysis
-
K. Sakurai and Y. Zheng, “On Non-Pseudorandomness from Block Ciphers with Provable Immunity against Linear Cryptanalysis”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Vol. E80-A, No.1, 1997, pp.19-24.
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
, Issue.1
, pp. 19-24
-
-
Sakurai, K.1
Zheng, Y.2
|