-
1
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4), 229-246 (1994)
-
(1994)
J. Cryptology
, vol.7
, Issue.4
, pp. 229-246
-
-
Biham, E.1
-
2
-
-
24944515451
-
Related-key boomerang and rectangle attacks
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Biham, E., Dunkelman, O., Keller, N.: Related-Key Boomerang and Rectangle Attacks. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 507-525. Springer, Heidelberg (2005) (Pubitemid 41313972)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
3
-
-
72449149100
-
Related-Key Cryptanalysis of the Full AES-192 and AES-256
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D.: Related-Key Cryptanalysis of the Full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 1-18
-
-
Biryukov, A.1
Khovratovich, D.2
-
4
-
-
70350346078
-
Distinguisher and Related-Key Attack on the Full AES-256
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Biryukov, A., Khovratovich, D., Nikolic, I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 231-249
-
-
Biryukov, A.1
Khovratovich, D.2
Nikolic, I.3
-
7
-
-
84974678303
-
Improved Cryptanalysis of Rijndael
-
Schneier, B. (ed.) FSE 2000. Springer, Heidelberg
-
Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213-230. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1978
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
8
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. Springer, Heidelberg
-
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1-24. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.R.1
Mantin, I.2
Shamir, A.3
-
9
-
-
38149085478
-
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Kim, J., Hong, S., Preneel, B.: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 225-241. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 225-241
-
-
Kim, J.1
Hong, S.2
Preneel, B.3
-
10
-
-
35048892576
-
Cryptanalysis of LOKI91
-
Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. Springer, Heidelberg
-
Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.718
, pp. 196-208
-
-
Knudsen, L.R.1
-
12
-
-
38549101578
-
Breaking 104 bit WEP in less than 60 seconds
-
Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
-
Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit WEP in less than 60 seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 188-202. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4867
, pp. 188-202
-
-
Tews, E.1
Weinmann, R.-P.2
Pyshkin, A.3
|