메뉴 건너뛰기




Volumn 6147 LNCS, Issue , 2010, Pages 347-364

Another look at complementation properties

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEMENTATION; COMPRESSION FUNCTIONS; DISTINGUISHERS; EXHAUSTIVE SEARCH; FIXED POINTS; GENERALISATION; KEY ATTACK; SECRET KEY; SELF SIMILARITY PROPERTIES; SYMMETRY RELATIONS; WEAK KEY;

EID: 77954706665     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13858-4_20     Document Type: Conference Paper
Times cited : (26)

References (21)
  • 2
    • 84958748914 scopus 로고    scopus 로고
    • In How Many Ways Can You Write Rijndael?
    • Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
    • Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160-175. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2501 , pp. 160-175
    • Barkan, E.1    Biham, E.2
  • 3
    • 85006024828 scopus 로고
    • New Types of Cryptoanalytic Attacks Using related Keys
    • (Extended Abstract). Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Biham, E.: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398-409. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 398-409
    • Biham, E.1
  • 4
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4), 229-246 (1994)
    • (1994) J. Cryptology , vol.7 , Issue.4 , pp. 229-246
    • Biham, E.1
  • 5
    • 84957610784 scopus 로고    scopus 로고
    • Slide Attacks
    • Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
    • Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1636 , pp. 245-259
    • Biryukov, A.1    Wagner, D.2
  • 6
    • 33745654751 scopus 로고    scopus 로고
    • Block Ciphers Sensitive to Gröbner Basis Attacks
    • Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
    • Buchmann, J., Pyshkin, A., Weinmann, R.P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 313-331. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3860 , pp. 313-331
    • Buchmann, J.1    Pyshkin, A.2    Weinmann, R.P.3
  • 7
    • 58349093205 scopus 로고    scopus 로고
    • Slide Attacks on a Class of Hash Functions
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Gorski, M., Lucks, S., Peyrin, T.: Slide Attacks on a Class of Hash Functions. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 143-160. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 143-160
    • Gorski, M.1    Lucks, S.2    Peyrin, T.3
  • 8
    • 79952615295 scopus 로고    scopus 로고
    • SHA-3 Proposal: Lesamnta
    • Submission to
    • Hirose, S., Kuwakado, H., Yoshida, H.: SHA-3 Proposal: Lesamnta. Submission to NIST (2008)
    • (2008) NIST
    • Hirose, S.1    Kuwakado, H.2    Yoshida, H.3
  • 9
    • 84947929289 scopus 로고    scopus 로고
    • The Interpolation Attack on Block Ciphers
    • Biham, E. (ed.) FSE 1997. Springer, Heidelberg
    • Jakobsen, T., Knudsen, L.R.: The Interpolation Attack on Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28-40. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 10
    • 33746056045 scopus 로고    scopus 로고
    • Herding Hash Functions and the Nostradamus Attack
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Kelsey, J., Kohno, T.: Herding Hash Functions and the Nostradamus Attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183-200. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 183-200
    • Kelsey, J.1    Kohno, T.2
  • 11
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 12
    • 35048892576 scopus 로고
    • Cryptanalysis of LOKI91
    • Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. Springer, Heidelberg
    • Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.718 , pp. 196-208
    • Knudsen, L.R.1
  • 13
    • 85028761685 scopus 로고
    • A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems
    • (Extended Abstract). Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. Springer, Heidelberg
    • Kwan, M., Pieprzyk, J.: A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 237-246. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.739 , pp. 237-246
    • Kwan, M.1    Pieprzyk, J.2
  • 14
    • 24144447286 scopus 로고    scopus 로고
    • Complementation-Like and Cyclic Properties of AES Round Functions
    • Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. Springer, Heidelberg
    • Le, T.V., Sparr, R.,Wernsdorf, R., Desmedt, Y.: Complementation-Like and Cyclic Properties of AES Round Functions. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 128-141. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3373 , pp. 128-141
    • Le, T.V.1    Sparr, R.2    Wernsdorf, R.3    Desmedt, Y.4
  • 15
    • 58949086800 scopus 로고    scopus 로고
    • Related-key rectangle attack on 36 rounds of the XTEA block cipher
    • Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. Int. J. Inf. Sec. 8(1), 1-11 (2009)
    • (2009) Int. J. Inf. Sec. , vol.8 , Issue.1 , pp. 1-11
    • Lu, J.1
  • 16
    • 70350421151 scopus 로고    scopus 로고
    • ESSENCE: A Candidate Hashing Algorithm for the NIST Competition
    • Submission to
    • Martin, J.W.: ESSENCE: A Candidate Hashing Algorithm for the NIST Competition. Submission to NIST (2008)
    • (2008) NIST
    • Martin, J.W.1
  • 20
    • 36448992835 scopus 로고    scopus 로고
    • 17 Mistakes Microsoft Made in the Xbox Security System
    • Steil, M.: 17 Mistakes Microsoft Made in the Xbox Security System. In: CCC22 (2005)
    • (2005) CCC22
    • Steil, M.1
  • 21
    • 67650667840 scopus 로고    scopus 로고
    • Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Wang, X., Yu, H., Wang, W., Zhang, H., Zhan, T.: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 121-133. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 121-133
    • Wang, X.1    Yu, H.2    Wang, W.3    Zhang, H.4    Zhan, T.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.