-
1
-
-
72449208565
-
Preimages for step-reduced SHA-2
-
Matsui, M. (ed.) ASIACRYPT 2009 Springer, Heidelberg
-
Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step-Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 578-597
-
-
Aoki, K.1
Guo, J.2
Matusiewicz, K.3
Sasaki, Y.4
Wang, L.5
-
2
-
-
70350630742
-
Preimage attacks on one-block MD4, 63-Step MD5 and more
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008 Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
3
-
-
77954706665
-
Another look at complementation properties
-
Hong, S., Iwata, T. (eds.) FSE 2010 Springer, Heidelberg
-
Bouillaguet, C., Dunkelman, O., Leurent, G., Fouque, P.-A.: Another Look at Complementation Properties. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 347-364. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6147
, pp. 347-364
-
-
Bouillaguet, C.1
Dunkelman, O.2
Leurent, G.3
Fouque, P.-A.4
-
4
-
-
85034623360
-
Cryptanalysis of des with a reduced number of rounds: Sequences of linear factors in block ciphers
-
Williams, H.C. (ed.) CRYPTO 1985 Springer, Heidelberg
-
Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
5
-
-
0017501281
-
Exhaustive cryptanalysis of the nbs data encryption standard
-
Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10(6), 74-84 (1977) (Pubitemid 8574342)
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie Whitfield1
Hellman Martin, E.2
-
6
-
-
38349081452
-
Improved meet-in-the-middle attacks on reduced-round des
-
Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007 Springer, Heidelberg
-
Dunkelman, O., Sekar, G., Preneel, B.: Improved Meet-in-the-Middle Attacks on Reduced-Round DES. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 86-100. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 86-100
-
-
Dunkelman, O.1
Sekar, G.2
Preneel, B.3
-
7
-
-
79951804179
-
Kernel v2.6.14 tea.c
-
Grothe, A.: Kernel v2.6.14 tea.c. Linux Headquarters (2004), http://www.linuxhq.com/kernel/v2.6/14/crypto/tea.c
-
(2004)
Linux Headquarters
-
-
Grothe, A.1
-
8
-
-
35048813090
-
Differential cryptanalysis of TEA and XTEA
-
Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003 Springer, Heidelberg
-
Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W., Lee, S.: Differential Cryptanalysis of TEA and XTEA. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 402-417. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2971
, pp. 402-417
-
-
Hong, S.1
Hong, D.2
Ko, Y.3
Chang, D.4
Lee, W.5
Lee, S.6
-
9
-
-
77954613537
-
Improved preimage attack for 67-Step HAS-160
-
Lee, D., Hong, S. (eds.) ICISC 2009 Springer, Heidelberg
-
Hong, D., Koo, B., Sasaki, Y.: Improved Preimage Attack for 67-Step HAS-160. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 332-348. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5984
, pp. 332-348
-
-
Hong, D.1
Koo, B.2
Sasaki, Y.3
-
10
-
-
44449126213
-
A practical attack on kee loq
-
Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
-
Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 1-18. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
11
-
-
58549102773
-
Chai-tea, cryptographic hardware implementations of xTEA
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008 Springer, Heidelberg
-
Kaps, J.-P.: Chai-Tea, Cryptographic Hardware Implementations of xTEA. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 363-375. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 363-375
-
-
Kaps, J.-P.1
-
12
-
-
67650338267
-
Key-schedule cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
Koblitz, N. (ed.) CRYPTO 1996 Springer, Heidelberg
-
Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
13
-
-
0006540774
-
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA
-
Kelsey, J., Schneier, B., Wagner, D.: Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 233-246. Springer, Heidelberg (1997) (Pubitemid 127148051)
-
(1997)
Lecture Notes in Computer Science
, Issue.1334
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
14
-
-
35048899747
-
Related-key differential attacks on 27 Rounds of XTEA and Full-Round GOST
-
Roy, B.K., Meier, W. (eds.) FSE 2004 Springer, Heidelberg
-
Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.-S.: Related-Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 299-316
-
-
Ko, Y.1
Hong, S.2
Lee, W.3
Lee, S.4
Kang, J.-S.5
-
15
-
-
84887264477
-
A weak key class of XTEA for a related-key rectangle attack
-
Nguyen, P.Q. (ed.) VIETCRYPT 2006 Springer, Heidelberg
-
Lee, E., Hong, D., Chang, D., Hong, S., Lim, J.: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 286-297. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 286-297
-
-
Lee, E.1
Hong, D.2
Chang, D.3
Hong, S.4
Lim, J.5
-
16
-
-
58949086800
-
Related-key rectangle attack on 36 rounds of the XTEA block cipher
-
Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8(1), 1-11 (2009), http://jiqiang.googlepages.com/IJIS8.pdf
-
(2009)
International Journal of Information Security
, vol.8
, Issue.1
, pp. 1-11
-
-
Lu, J.1
-
17
-
-
84949443075
-
Impossible differential cryptanal-ysis of reduced round XTEA and TEA
-
Daemen, J., Rijmen, V. (eds.) FSE 2002 Springer, Heidelberg
-
Moon, D., Hwang, K., Lee, W., Lee, S., Lim, J.: Impossible Differential Cryptanal-ysis of Reduced Round XTEA and TEA. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 49-60. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2365
, pp. 49-60
-
-
Moon, D.1
Hwang, K.2
Lee, W.3
Lee, S.4
Lim, J.5
-
18
-
-
15744395962
-
-
Computer Laboratory, University of Cambridge October
-
Needham, R.M., Wheeler, D.J.: Tea extensions, technical report, Computer Laboratory, University of Cambridge (October 1997), http://www.cix.co.uk/ ∼klockstone/xtea.pdf
-
(1997)
Tea Extensions, Technical Report
-
-
Needham, R.M.1
Wheeler, D.J.2
-
19
-
-
34247179823
-
-
Technical report Computer Laboratory University of Cambridge October
-
Needham, R.M., Wheeler, D.J.: Correction to xtea. Technical report, Computer Laboratory, University of Cambridge (October 1998), http://www.movable-type.co.uk/scripts/xxtea.pdf
-
(1998)
Correction to Xtea
-
-
Needham, R.M.1
Wheeler, D.J.2
-
20
-
-
79951796088
-
-
unpublished manuscript October
-
Saarinen, M.-J.: Cryptanalysis of Block TEA, unpublished manuscript (October 1998), http://groups.google.com/group/sci.crypt.research/msg/ f52a533d1e2fa15e
-
(1998)
Cryptanalysis of Block TEA
-
-
Saarinen, M.-J.1
-
21
-
-
67650679771
-
Finding preimages in Full MD5 faster than exhaustive search
-
Joux, A. (ed.) EUROCRYPT 2009 Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster Than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
22
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656-715 (1949)
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
23
-
-
36448992835
-
17 mistakes microsoft made in the xbox security system
-
Steil, M.: 17 Mistakes Microsoft Made in the Xbox Security System. In: Chaos Communication Congress 2005 (2005), http://events.ccc.de/congress/2005/ fahrplan/events/559.en.html
-
(2005)
Chaos Communication Congress 2005
-
-
Steil, M.1
-
24
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
Preneel, B. (ed.) FSE 1994 Springer, Heidelberg
-
Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363-366. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1008
, pp. 363-366
-
-
Wheeler, D.J.1
Needham, R.M.2
|