-
1
-
-
38149088948
-
Improved slide attacks
-
Biryukov, A. (ed.) FSE 2007 Springer, Heidelberg
-
Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 153-166. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 153-166
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
3
-
-
84957610784
-
Slide attacks
-
Knudsen, L.R. (ed.) FSE 1999 Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245-259. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
4
-
-
84948988609
-
Advanced slide attacks
-
Preneel, B. (ed.) EUROCRYPT 2000 Springer, Heidelberg
-
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 589-606
-
-
Biryukov, A.1
Wagner, D.2
-
6
-
-
84859992374
-
-
Technical report, to appear
-
Dinur, I., Dunkelman, O., Shamir, A.: Improved Attacks on GOST. Technical report, to appear (2011)
-
(2011)
Improved Attacks on GOST
-
-
Dinur, I.1
Dunkelman, O.2
Shamir, A.3
-
7
-
-
84859951941
-
-
Cryptology ePrint Archive, Report 2011/541
-
Dunkelman, O., Keller, N., Shamir, A.: Minimalism in Cryptography: The Even-Mansour Scheme Revisited. Cryptology ePrint Archive, Report 2011/541 (2011), http://eprint.iacr.org/
-
(2011)
Minimalism in Cryptography: The Even-Mansour Scheme Revisited
-
-
Dunkelman, O.1
Keller, N.2
Shamir, A.3
-
9
-
-
1942530977
-
A construction of a cipher from a single pseudorandom permutation
-
Even, S., Mansour, Y.: A Construction of a Cipher from a Single Pseudorandom Permutation. J. Cryptology 10(3), 151-162 (1997)
-
(1997)
J. Cryptology
, vol.10
, Issue.3
, pp. 151-162
-
-
Even, S.1
Mansour, Y.2
-
10
-
-
0009485081
-
Nondeterministic algorithms
-
Floyd, R.W.: Nondeterministic Algorithms. J. ACM 14(4), 636-644 (1967)
-
(1967)
J ACM
, vol.14
, Issue.4
, pp. 636-644
-
-
Floyd, R.W.1
-
11
-
-
84871584138
-
-
ASIACRYPT 1991 Springer, Heidelberg
-
Imai, H., Rivest, R.L., Matsumoto, T. (eds.): ASIACRYPT 1991. LNCS, vol. 739. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.739
-
-
Imai, H.1
Rivest, R.L.2
Matsumoto, T.3
-
12
-
-
0037614498
-
How to protect des against exhaustive key search (an Analysis of DESX)
-
Kilian, J., Rogaway, P.: How to Protect DES Against Exhaustive Key Search (an Analysis of DESX). J. Cryptology 14(1), 17-35 (2001)
-
(2001)
J. Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
13
-
-
77956683199
-
Power of a public random permutation and its application to authenticated encryption
-
Kurosawa, K.: Power of a Public Random Permutation and Its Application to Authenticated Encryption. IEEE Transactions on Information Theory 56(10), 5366-5374 (2010)
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.10
, pp. 5366-5374
-
-
Kurosawa, K.1
-
14
-
-
1842610602
-
Cycle detection using a stack
-
Nivasch, G.: Cycle Detection Using a Stack. Inf. Process. Lett. 90(3), 135-140 (2004)
-
(2004)
Inf. Process. Lett.
, vol.90
, Issue.3
, pp. 135-140
-
-
Nivasch, G.1
-
15
-
-
84859976772
-
-
Never published
-
Rivest, R.L.: DESX. Never published (1984)
-
(1984)
DESX
-
-
Rivest, R.L.1
-
16
-
-
84859943088
-
Federal Information Processing Standard-Cryptographic Protection-Cryptographic Algorithm
-
Russian National Bureau of Standards
-
Russian National Bureau of Standards: Federal Information Processing Standard-Cryptographic Protection-Cryptographic Algorithm. GOST 28147-89 (1989)
-
(1989)
GOST
, pp. 28147-28189
-
-
|