-
1
-
-
70350630742
-
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
2
-
-
38149088948
-
Improved Slide Attacks
-
Biryukov, A. (ed.)
-
Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) [3], pp. 153-166
-
LNCS
, pp. 153-166
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
3
-
-
79959975820
-
FSE 2007
-
Springer, Heidelberg
-
Biryukov, A. (ed.): FSE 2007. LNCS, vol. 4593. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
-
-
Biryukov, A.1
-
4
-
-
84957610784
-
Slide attacks
-
Knudsen, L.R. (ed.) FSE 1999. Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
5
-
-
84948988609
-
Advanced Slide Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
6
-
-
37149045263
-
PRESENT: An Ultra-Lightweight Block Cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
7
-
-
79952610354
-
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block CipherKTANTAN
-
Biryukov, A.,Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
-
Bogdanov, A., Rechberger, C.: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block CipherKTANTAN. In: Biryukov, A.,Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 229-240. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6544
, pp. 229-240
-
-
Bogdanov, A.1
Rechberger, C.2
-
8
-
-
70350589237
-
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 272-288
-
-
De Cannière, C.1
Dunkelman, O.2
Knežević, M.3
-
9
-
-
85034623360
-
Cryptanalysis of des with a Reduced Number of Rounds Sequences of Linear Factors in Block Cipher
-
Williams, H.C. (ed.) CRYPTO 1985. Springer, Heidelberg
-
Chaum, D., Evertse, J.-H.: Cryptanalysis of DES with a Reduced Number of Rounds Sequences of Linear Factors in Block Cipher. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 192-211. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.218
, pp. 192-211
-
-
Chaum, D.1
Evertse, J.-H.2
-
10
-
-
50249150254
-
A Meet-in-the-Middle Attack on 8-Round AES
-
Nyberg, K. (ed.)
-
Demirci, H., Selçuk, A.A.: A Meet-in-the-Middle Attack on 8-Round AES. In: Nyberg, K. (ed.) [23], pp. 116-126
-
LNCS
, pp. 116-126
-
-
Demirci, H.1
Selçuk, A.A.2
-
11
-
-
77649255148
-
Improved Meet-in-the-Middle Attacks on AES
-
Roy, B.K., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Demirci, H., Taşkin, İ., Çoban, M., Baysal, A.: Improved Meet-in-the-Middle Attacks on AES. In: Roy, B.K., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 144-156. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 144-156
-
-
Demirci, H.1
Taşkin, I.2
Çoban, M.3
Baysal, A.4
-
12
-
-
0017501281
-
Exhaustive Cryptanalysis of the NBS Data Encryption Standard
-
Diffie, W., Hellman, M.E.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer 10, 74-84 (1977)
-
(1977)
Computer
, vol.10
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.E.2
-
13
-
-
78650817425
-
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Dunkelman, O., Keller, N., Shamir, A.: Improved Single-Key Attacks on 8-Round AES-192 and AES-256. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 158-176. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 158-176
-
-
Dunkelman, O.1
Keller, N.2
Shamir, A.3
-
14
-
-
38349081452
-
Improved Meet-in-the-Middle Attacks on Reduced-Round des
-
Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. Springer, Heidelberg
-
Dunkelman, O., Sekar, G., Preneel, B.: Improved Meet-in-the-Middle Attacks on Reduced-Round DES. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 86-100. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4859
, pp. 86-100
-
-
Dunkelman, O.1
Sekar, G.2
Preneel, B.3
-
15
-
-
84878494764
-
Key Recovery Attack on full GOST. Block Cipher with Negligible Time and Memory
-
Western European Workshop on Research in Cryptology (WEWoRC). Springer, Heidelberg
-
Fleischmann, E., Gorski, M., Hüehne, J., Lucks, S.: Key Recovery Attack on full GOST. Block Cipher with Negligible Time and Memory. In: Western European Workshop on Research in Cryptology (WEWoRC). LNCS, vol. 6429. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.6429
-
-
Fleischmann, E.1
Gorski, M.2
Hüehne, J.3
Lucks, S.4
-
16
-
-
44449126213
-
A Practical Attack on KeeLoq
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Indesteege, S., Keller, N., Dunkelman, O., Biham, E., Preneel, B.: A Practical Attack on KeeLoq. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 1-18. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
17
-
-
58549088569
-
Reflection Cryptanalysis of Some Ciphers
-
Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
-
Kara, O.: Reflection Cryptanalysis of Some Ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 294-307. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 294-307
-
-
Kara, O.1
-
18
-
-
38149004545
-
A New Class of Weak Keys for Blowfish
-
Biryukov, A. (ed.)
-
Kara, O., Manap, C.: A New Class of Weak Keys for Blowfish. In: Biryukov, A. (ed.) [3], pp. 167-180
-
LNCS
, pp. 167-180
-
-
Kara, O.1
Manap, C.2
-
19
-
-
35048899747
-
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
-
Roy, B.K., Meier, W. (eds.) FSE 2004. Springer, Heidelberg
-
Ko, Y., Hong, S.H., Lee, W.I., Lee, S.-J., Kang, J.-S.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 299-316
-
-
Ko, Y.1
Hong, S.H.2
Lee, W.I.3
Lee, S.-J.4
Kang, J.-S.5
-
20
-
-
50249150778
-
A (Second) Preimage Attack on the GOST Hash Function
-
Nyberg, K. (ed.)
-
Mendel, F., Pramstaller, N., Rechberger, C.: A (Second) Preimage Attack on the GOST Hash Function. In: Nyberg, K. (ed.) [23], pp. 224-234.
-
LNCS
, pp. 224-234
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
-
21
-
-
51849136016
-
Cryptanalysis of the GOST Hash Function
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M., Szmidt, J.: Cryptanalysis of the GOST Hash Function. In:Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 162-178. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 162-178
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
Kontak, M.4
Szmidt, J.5
-
23
-
-
79959928870
-
FSE 2008
-
Springer, Heidelberg
-
Nyberg, K. (ed.): FSE 2008. LNCS, vol. 5086. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
-
-
Nyberg, K.1
-
24
-
-
78049330328
-
256 Bit Standardized Crypto for 650 GE - GOST Revisited
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Poschmann, A., Ling, S., Wang, H.: 256 Bit Standardized Crypto for 650 GE - GOST Revisited. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 219-233. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 219-233
-
-
Poschmann, A.1
Ling, S.2
Wang, H.3
-
25
-
-
67650679771
-
Finding Preimages in Full MD5 Faster Than Exhaustive Search
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster Than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
26
-
-
84953635000
-
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
-
Anderson, R.J. (ed.) FSE 1993. Springer, Heidelberg
-
Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Anderson, R.J. (ed.) FSE 1993. LNCS, vol. 809, pp. 191-204. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
27
-
-
0003855464
-
-
2nd edn. Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York
-
Schneier, B.: Applied Cryptography, 2nd edn. Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1995)
-
(1995)
Applied Cryptography
-
-
Schneier, B.1
-
28
-
-
84949198848
-
Differential Cryptanalysis of Reduced Rounds of GOST
-
Stinson, D.R., Tavares, S.E. (eds.) SAC 2000. Springer, Heidelberg
-
Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S.E. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315-323. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2012
, pp. 315-323
-
-
Seki, H.1
Kaneko, T.2
|