-
1
-
-
84947444236
-
The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267
-
J. Daemen, L. Knudsen and V. Rijmen. The Block Cipher SQUARE, Fast Software Encryption, Fourth International Workshop, LNCS 1267, Springer-Verlag, 1997, pp 149-165.
-
(1997)
Springer-Verlag
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.2
Rijmen, V.3
-
2
-
-
85006024828
-
New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology–EUROCRYPT’93
-
E. Biham. New Types of Cryptanalytic Attacks using Related Keys, Advances in Cryptology–EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp 398-409.
-
(1993)
LNCS 765, Springer-Verlag
, pp. 398-409
-
-
Biham, E.1
-
3
-
-
85025673016
-
Weak Keys for IDEA, Advances in Cryptology–CRYPTO’93
-
J. Daemen, R. Govaerts and J. Vandewalle. Weak Keys for IDEA, Advances in Cryptology–CRYPTO’93, LNCS 773, Springer-Verlag, 1993, pp 224-231.
-
(1993)
LNCS 773, Springer-Verlag
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
4
-
-
85088355842
-
New Potentially Weak Keys for DES and LOKI, Advances in Cryptology–EUROCRYPT’94
-
L. Knudsen. New Potentially Weak Keys for DES and LOKI, Advances in Cryptology–EUROCRYPT’94, LNCS 950, Springer-Verlag, 1994, pp 419-424.
-
(1994)
LNCS 950, Springer-Verlag
, pp. 419-424
-
-
Knudsen, L.1
-
5
-
-
21344477994
-
Cryptanalysis of LOKI91, AUSCRYPT’92
-
L. Knudsen. Cryptanalysis of LOKI91, AUSCRYPT’92, LNCS 718, Springer- Verlag, 1992, pp 196-208.
-
(1992)
LNCS 718, Springer- Verlag
, pp. 196-208
-
-
Knudsen, L.1
-
6
-
-
84949229156
-
A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology– CRYPTO’95
-
L. Knudsen. A Key-Schedule Weakness in SAFER K-64, Advances in Cryptology– CRYPTO’95, LNCS 963, Springer-Verlag, 1995, pp 274-286.
-
(1995)
LNCS 963, Springer-Verlag
, pp. 274-286
-
-
Knudsen, L.1
-
8
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C.E. Shannon. Communication Theory of Secrecy Systems, Bell System Technical Journal, ol.28, October 1949, pp 656-715.
-
(1949)
Bell System Technical Journal, Ol
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
9
-
-
85025652210
-
Practically Secure Feistel Ciphers, Fast Software Encryption
-
L. Knudsen. Practically Secure Feistel Ciphers, Fast Software Encryption, First International Workshop Proceedings, LNCS 809, Springer-Verlag, 1993, pp 211-221.
-
(1993)
First International Workshop Proceedings, LNCS 809, Springer-Verlag
, pp. 211-221
-
-
Knudsen, L.1
-
11
-
-
84958979426
-
The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers and E. DeWin. The Cipher SHARK, Fast Software Encryption, Third International Workshop, LNCS 1039, Springer- Verlag, 1996, pp 99-111.
-
(1996)
Springer- Verlag
, pp. 99-111
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
Dewin, E.5
-
12
-
-
84953635000
-
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809
-
B. Schneier. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, First International Workshop, LNCS 809, Springer-Verlag, 1993, pp 191-204.
-
(1993)
Springer-Verlag
, pp. 191-204
-
-
Schneier, B.1
-
13
-
-
0012055850
-
A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000)
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, Workshop on Selected Areas in Cryptography (SAC 2000), LNCS 2012, pp 39-56.
-
(2012)
LNCS
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Camellia, T.T.7
-
14
-
-
24144436510
-
Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop
-
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner and D. Whiting. Improved Cryptanalysis of Rijndael, Fast Software Encryption, Seventh International Workshop, LNCS 1978, Springer-Verlag, 2000, pp 213-230.
-
(2000)
LNCS 1978, Springer-Verlag
, pp. 213-230
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
15
-
-
0028714298
-
A Computer Package for Measuring the Strength of Ciphers
-
H. Gustafson, E. Dawson, L. Nielsen and W. Caelli. A Computer Package for Measuring the Strength of Ciphers, Journal of Computers and Security, Vol.13, No.8, pp 687-697.
-
Journal of Computers and Security
, vol.13
, Issue.8
, pp. 687-697
-
-
Gustafson, H.1
Dawson, E.2
Nielsen, L.3
Caelli, W.4
-
16
-
-
84947471290
-
-
Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference
-
L. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard, Third Advanced Encryption Standard Conference, April 2000. Available at http://csrc.nist.gov/encryption/aes/
-
(2000)
Efficiency Testing of ANSI C Implementations of Round
, vol.2
-
-
Bassham, L.1
|