-
1
-
-
84859780919
-
-
Specification for the Advanced Encryption Standard (AES)
-
Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001).
-
(2001)
Federal Information Processing Standards Publication
, vol.197
-
-
-
2
-
-
84859759762
-
-
American Mathematical Society. ISBN 0821816462
-
American Mathematical Society. Algebra, ISBN 0821816462 (1999).
-
(1999)
Algebra
-
-
-
3
-
-
84859784913
-
-
CD-1: Documentation, August 20-22, Ventura
-
Anderson, R. A., Biham, E., Knudsen, L. R.: Serpent. Proc. of the 1st AES candidate conference, CD-1: Documentation, August 20-22, Ventura (1998).
-
(1998)
Serpent. Proc. of the 1st AES candidate conference
-
-
Anderson, R.A.1
Biham, E.2
Knudsen, L.R.3
-
4
-
-
85085849479
-
Maximum non-averaged differential probability
-
LNCS 1556 Springer-Verlag
-
Aoki, K.: Maximum non-averaged differential probability. Selected Areas in Cryptography SAC '98, LNCS 1556, pp. 118-130. Springer-Verlag (1998).
-
(1998)
Selected Areas in Cryptography SAC '98
, pp. 118-130
-
-
Aoki, K.1
-
5
-
-
84949218850
-
Camellia: a 128-bit block cipher suitable for multiple platforms-Design and analysis
-
In: Stinson, D., Tavares, S. (eds.)., LNCS 2012, Springer-Verlag
-
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: a 128-bit block cipher suitable for multiple platforms-Design and analysis. In: Stinson, D., Tavares, S. (eds.) Selected Areas in Cryptography 2000, LNCS 2012, pp. 39-56. Springer-Verlag (2000).
-
(2000)
Selected Areas in Cryptography 2000
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
6
-
-
35048850801
-
The Anubis block cipher
-
Leuven, November 13-14
-
Barreto, P., Rijmen, V.: The Anubis block cipher. First open NESSIE Workshop, Leuven, November 13-14, http://paginas. terra. com. br/informatica/paulobarreto/AnubisPage. html (2000).
-
(2000)
First open NESSIE Workshop
-
-
Barreto, P.1
Rijmen, V.2
-
7
-
-
0026397734
-
Differential cryptanalysis of DES-like Cryptosystems
-
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1), 3-72 (1991).
-
(1991)
J. Cryptol.
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84957608539
-
Differential cryptanalysis of Lucifer
-
In: Stinson, D. (ed.)., LNCS 773, Springer-Verlag
-
Ben-Aroya, I., Biham, E.: Differential cryptanalysis of Lucifer. In: Stinson, D. (ed.) Advances in Cryptology, Proc. Crypto'93, LNCS 773, pp. 187-199. Springer-Verlag (1994).
-
(1994)
Advances in Cryptology, Proc. Crypto'93
, pp. 187-199
-
-
Ben-Aroya, I.1
Biham, E.2
-
9
-
-
34047214844
-
Differential cryptanalysis of Feistel ciphers and differentially δ-uniform mappings
-
Canteaut, A.: Differential cryptanalysis of Feistel ciphers and differentially δ-uniform mappings. Workshop record of Selected Areas in Cryptography SAC '97, pp. 172-184 (1997).
-
(1997)
Workshop record of Selected Areas in Cryptography SAC '97
, pp. 172-184
-
-
Canteaut, A.1
-
10
-
-
85025673016
-
Weak keys of IDEA
-
In: Stinson, D. (ed.)., LNCS 773, Springer-Verlag
-
Daemen, J., Govaerts, R., Vandewalle, J.: Weak keys of IDEA. In: Stinson, D. (ed.) Advances in Cryptology, Proc. Crypto'93, LNCS 773, pp. 224-231. Springer-Verlag (1994).
-
(1994)
Advances in Cryptology, Proc. Crypto'93
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
11
-
-
85026894824
-
A new approach to block cipher design
-
In: Anderson, R. (ed.)., LNCS 809, Springer-Verlag
-
Daemen, J., Govaerts, R., Vandewalle, J.: A new approach to block cipher design. In: Anderson, R. (ed.) Proc. of Fast Software Encryption 1993, LNCS 809, pp. 18-32. Springer-Verlag (1994).
-
(1994)
Proc. of Fast Software Encryption 1993
, pp. 18-32
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
13
-
-
84947444236
-
The block cipher square
-
In: Biham, E. (ed.)., LNCS 1267, Springer-Verlag
-
Daemen, J., Knudsen, L. R. Rijmen, V.: The block cipher square. In: Biham, E. (ed.) Fast Software Encryption '97, LNCS 1267, pp. 149-165. Springer-Verlag (1997).
-
(1997)
Fast Software Encryption '97
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
14
-
-
34047192264
-
-
(Submitted to Nessie)
-
Daemen, J., Peeters, M., van Assche G., Rijmen, V.: Nessie proposal: the block cipher Noekeon. (Submitted to Nessie).
-
Nessie proposal: The block cipher Noekeon
-
-
Daemen, J.1
Peeters, M.2
van Assche, G.3
Rijmen, V.4
-
16
-
-
33750014789
-
Understanding two-round differentials in AES
-
(SCN 2006), LNCS 4116, Springer-Verlag
-
Daemen, J., Rijmen, V.: Understanding two-round differentials in AES. Security and Cryptography for Networks 2006 (SCN 2006), LNCS 4116, pp. 78-94. Springer-Verlag (2006).
-
(2006)
Security and Cryptography for Networks 2006
, pp. 78-94
-
-
Daemen, J.1
Rijmen, V.2
-
17
-
-
34047226611
-
Plateau characteristics
-
Daemen, J., Rijmen, V.: Plateau characteristics. IET Inf. Secur. 1(1), 11-18 (2007).
-
(2007)
IET Inf. Secur.
, vol.1
, Issue.1
, pp. 11-18
-
-
Daemen, J.1
Rijmen, V.2
-
18
-
-
24144440948
-
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
-
(AES 2004), LNCS 3373,Springer-Verlag
-
Keliher, L.: Refined analysis of bounds related to linear and differential cryptanalysis for the AES. Advanced Encryption Standard-AES, 4th international conference (AES 2004), LNCS 3373, pp. 42-57. Springer-Verlag (2005).
-
(2005)
Advanced Encryption Standard-AES, 4th international conference
, pp. 42-57
-
-
Keliher, L.1
-
19
-
-
35148873464
-
Exact maximum expected differential and linear probability for 2-round advanced encryption standard (AES)
-
Keliher, L., Sui, J.: Exact maximum expected differential and linear probability for 2-round advanced encryption standard (AES). IET Inf. Secur. 1(2), 53-57 (2007).
-
(2007)
IET Inf. Secur.
, vol.1
, Issue.2
, pp. 53-57
-
-
Keliher, L.1
Sui, J.2
-
20
-
-
0009319575
-
2-DES
-
In: Brickell, E. F. (ed.)., LNCS 746,Springer-Verlag
-
2-DES. In: Brickell, E. F. (ed.) Advances in Cryptology, Proc. CRYPTO'92, LNCS 746, pp. 497-511. Springer-Verlag (1993).
-
(1993)
Advances in Cryptology, Proc. CRYPTO'92
, pp. 497-511
-
-
Knudsen, L.R.1
-
21
-
-
84948949623
-
Truncated and higher order differentials
-
In: Preneel, B. (ed.)., LNCS 1008,Springer-Verlag
-
Knudsen, L. R.: Truncated and higher order differentials. In: Preneel, B. (ed.) Fast Software Encryption '94, LNCS 1008, pp. 196-211. Springer-Verlag (1995).
-
(1995)
Fast Software Encryption '94
, pp. 196-211
-
-
Knudsen, L.R.1
-
22
-
-
35048889120
-
-
ESORICS 2004, LNCS 3193,Springer-Verlag
-
Knudsen, L. R., Mathiassen, J. E.: On the role of key schedules in attacks on iterated ciphers. ESORICS 2004, LNCS 3193, pp. 322-334. Springer-Verlag (2004).
-
(2004)
On the role of key schedules in attacks on iterated ciphers
, pp. 322-334
-
-
Knudsen, L.R.1
Mathiassen, J.E.2
-
23
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
In: Davies, D. W. (ed.)., LNCS 547, Springer-Verlag
-
Lai, X., Massey, J. L., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D. W. (ed.) Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, pp. 17-38. Springer-Verlag (1991).
-
(1991)
Advances in Cryptology, Proc. Eurocrypt'91
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
25
-
-
0347585053
-
New block encryption algorithm misty
-
In: Biham, E. (ed.)., LNCS 1267, Springer-Verlag
-
Matsui, M.: New block encryption algorithm misty. In: Biham, E. (ed.) Fast Software Encryp tion '97, LNCS 1267, pp. 64-74. Springer-Verlag (1997).
-
(1997)
Fast Software Encryp tion '97
, pp. 64-74
-
-
Matsui, M.1
-
26
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
In: Helleseth, T. (ed.)., LNCS 765, Springer-Verlag
-
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, pp. 55-64. Springer-Verlag (1993).
-
(1993)
Advances in Cryptology, Proc. Eurocrypt'93
, pp. 55-64
-
-
Nyberg, K.1
-
27
-
-
0029632010
-
Provable security against a differential attack
-
Nyberg, K., Knudsen, L. R.: Provable security against a differential attack. J. Cryptol. 8(1), 27-38 (1995).
-
(1995)
J. Cryptol.
, vol.8
, Issue.1
, pp. 27-38
-
-
Nyberg, K.1
Knudsen, L.R.2
-
28
-
-
84958758328
-
On the security of Rijndael-like structures against differential and linear cryptanalysis
-
In: Zheng, Y. (ed.)., LNCS 2501,Springer-Verlag
-
Park, S., Sung, S. H., Chee, S., E-J. Yoon, Lim, J.: On the security of Rijndael-like structures against differential and linear cryptanalysis. In: Zheng, Y. (ed.) Advances in Cryptology, Proceedings of Asiacrypt '02, LNCS 2501, pp. 176-191. Springer-Verlag (2002).
-
(2002)
Advances in Cryptology, Proceedings of Asiacrypt '02
, pp. 176-191
-
-
Park, S.1
Sung, S.H.2
Chee, S.3
Yoon, E.-J.4
Lim, J.5
-
29
-
-
0242487613
-
Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES
-
In: Johansson, T. (ed.)., LNCS 2887,Springer-Verlag
-
Park, S., Sung, S. H., Lee, S., Lim, J.: Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson, T. (ed.) Fast Software Encryption '03, LNCS 2887, pp. 247-260. Springer-Verlag (2003).
-
(2003)
Fast Software Encryption '03
, pp. 247-260
-
-
Park, S.1
Sung, S.H.2
Lee, S.3
Lim, J.4
-
30
-
-
4344657952
-
Cryptanalysis and design of iterated block ciphers
-
October, K. U. Leuven
-
Rijmen, V.: Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, October 1997, K. U. Leuven.
-
(1997)
Doctoral Dissertation
-
-
Rijmen, V.1
-
31
-
-
84958979426
-
The cipher SHARK
-
In: Gollmann, D. (ed.)., LNCS 1039, Springer-Verlag
-
Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win E.: The cipher SHARK. In: Gollmann, D. (ed.) Fast Software Encryption '96, LNCS 1039, pp. 99-111. Springer-Verlag (1996).
-
(1996)
Fast Software Encryption '96
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
de Win, E.5
-
32
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
In: Preneel, B. (ed.)., LNCS 1008, Springer-Verlag
-
Vaudenay, S.: On the need for multipermutations: cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) Fast Software Encryption '94, LNCS 1008, pp. 286-297. Springer-Verlag (1995).
-
(1995)
Fast Software Encryption '94
, pp. 286-297
-
-
Vaudenay, S.1
-
33
-
-
84958623161
-
Plateaued functions
-
LNCS 1726, Springer-Verlag
-
Zheng, Y., Zhang, X. M.: Plateaued functions. Advances in Cryptology, ICICS '99, LNCS 1726, pp. 284-300. Springer-Verlag (1999).
-
(1999)
Advances in Cryptology, ICICS '99
, pp. 284-300
-
-
Zheng, Y.1
Zhang, X.M.2
|