-
1
-
-
77954691852
-
-
Official Comment
-
Aumasson, J.P., Bjørstad, T.E., Meier, W., Mendel, F.: Observation on the PRE-MIXING step of CHI-256 and CHI-224. Official Comment (2009)
-
(2009)
Observation on the PRE-MIXING Step of CHI-256 and CHI-224
-
-
Aumasson, J.P.1
Bjørstad, T.E.2
Meier, W.3
Mendel, F.4
-
2
-
-
84958748914
-
In How Many Ways Can You Write Rijndael?
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160-175. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 160-175
-
-
Barkan, E.1
Biham, E.2
-
3
-
-
85006024828
-
New Types of Cryptoanalytic Attacks Using related Keys
-
(Extended Abstract). Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
-
Biham, E.: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398-409. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
4
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4), 229-246 (1994)
-
(1994)
J. Cryptology
, vol.7
, Issue.4
, pp. 229-246
-
-
Biham, E.1
-
5
-
-
84957610784
-
Slide Attacks
-
Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
6
-
-
33745654751
-
Block Ciphers Sensitive to Gröbner Basis Attacks
-
Pointcheval, D. (ed.) CT-RSA 2006. Springer, Heidelberg
-
Buchmann, J., Pyshkin, A., Weinmann, R.P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 313-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3860
, pp. 313-331
-
-
Buchmann, J.1
Pyshkin, A.2
Weinmann, R.P.3
-
7
-
-
58349093205
-
Slide Attacks on a Class of Hash Functions
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Gorski, M., Lucks, S., Peyrin, T.: Slide Attacks on a Class of Hash Functions. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 143-160. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 143-160
-
-
Gorski, M.1
Lucks, S.2
Peyrin, T.3
-
9
-
-
84947929289
-
The Interpolation Attack on Block Ciphers
-
Biham, E. (ed.) FSE 1997. Springer, Heidelberg
-
Jakobsen, T., Knudsen, L.R.: The Interpolation Attack on Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28-40. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
10
-
-
33746056045
-
Herding Hash Functions and the Nostradamus Attack
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Kelsey, J., Kohno, T.: Herding Hash Functions and the Nostradamus Attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183-200. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 183-200
-
-
Kelsey, J.1
Kohno, T.2
-
11
-
-
67650338267
-
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
-
Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
12
-
-
35048892576
-
Cryptanalysis of LOKI91
-
Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. Springer, Heidelberg
-
Knudsen, L.R.: Cryptanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196-208. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.718
, pp. 196-208
-
-
Knudsen, L.R.1
-
13
-
-
85028761685
-
A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems
-
(Extended Abstract). Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. Springer, Heidelberg
-
Kwan, M., Pieprzyk, J.: A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract). In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 237-246. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.739
, pp. 237-246
-
-
Kwan, M.1
Pieprzyk, J.2
-
14
-
-
24144447286
-
Complementation-Like and Cyclic Properties of AES Round Functions
-
Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. Springer, Heidelberg
-
Le, T.V., Sparr, R.,Wernsdorf, R., Desmedt, Y.: Complementation-Like and Cyclic Properties of AES Round Functions. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol. 3373, pp. 128-141. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3373
, pp. 128-141
-
-
Le, T.V.1
Sparr, R.2
Wernsdorf, R.3
Desmedt, Y.4
-
15
-
-
58949086800
-
Related-key rectangle attack on 36 rounds of the XTEA block cipher
-
Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. Int. J. Inf. Sec. 8(1), 1-11 (2009)
-
(2009)
Int. J. Inf. Sec.
, vol.8
, Issue.1
, pp. 1-11
-
-
Lu, J.1
-
16
-
-
70350421151
-
ESSENCE: A Candidate Hashing Algorithm for the NIST Competition
-
Submission to
-
Martin, J.W.: ESSENCE: A Candidate Hashing Algorithm for the NIST Competition. Submission to NIST (2008)
-
(2008)
NIST
-
-
Martin, J.W.1
-
18
-
-
77954709030
-
Cryptanalysis of ESSENCE
-
Report 2009/302
-
Naya-Plasencia, M., Röck, A., Aumasson, J.P., Laigle-Chapuy, Y., Leurent, G., Meier, W., Peyrin, T.: Cryptanalysis of ESSENCE. Cryptology ePrint Archive, Report 2009/302 (2009), http://eprint.iacr.org/
-
(2009)
Cryptology ePrint Archive
-
-
Naya-Plasencia, M.1
Röck, A.2
Aumasson, J.P.3
Laigle-Chapuy, Y.4
Leurent, G.5
Meier, W.6
Peyrin, T.7
-
20
-
-
36448992835
-
17 Mistakes Microsoft Made in the Xbox Security System
-
Steil, M.: 17 Mistakes Microsoft Made in the Xbox Security System. In: CCC22 (2005)
-
(2005)
CCC22
-
-
Steil, M.1
-
21
-
-
67650667840
-
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Wang, X., Yu, H., Wang, W., Zhang, H., Zhan, T.: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 121-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 121-133
-
-
Wang, X.1
Yu, H.2
Wang, W.3
Zhang, H.4
Zhan, T.5
|