메뉴 건너뛰기




Volumn 4341 LNCS, Issue , 2006, Pages 37-49

Searching for compact algorithms: CGEN

Author keywords

[No Author keywords available]

Indexed keywords

NUMBER THEORY; RANDOM NUMBER GENERATION;

EID: 84887313979     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11958239_3     Document Type: Conference Paper
Times cited : (27)

References (26)
  • 2
    • 33746077698 scopus 로고    scopus 로고
    • QUAD: A practical stream cipher with provable security
    • S. Vaudenay, editor LNCS Springer-Verlag
    • C. Berbain, H. Gilbert, and J. Patarin. QUAD: A Practical Stream Cipher with Provable Security. In S. Vaudenay, editor, Proceedi ngs of Eurocrypt 2006, LNCS, volume 4004, pages 109-128, Springer-Verlag, 2006.
    • (2006) Proceedi Ngs of Eurocrypt 2006 , vol.4004 , pp. 109-128
    • Berbain, C.1    Gilbert, H.2    Patarin, J.3
  • 4
    • 33745626422 scopus 로고    scopus 로고
    • Improved time-memory trade-offs with multiple data
    • B. Preneel and S. Tavares, editors LNCS Springer Verlag
    • A. Biryukov, S. Mukhopadhyay, and P. Sarkar. Improved Time-memory Trade-offs with Multiple Data. In B. Preneel and S. Tavares, editors, Proceedi ngs of SAC 2005, LNCS, volume 3897, pages 110-127, Springer Verlag.
    • Proceedi Ngs of SAC 2005 , vol.3897 , pp. 110-127
    • Biryukov, A.1    Mukhopadhyay, S.2    Sarkar, P.3
  • 6
    • 33646807471 scopus 로고    scopus 로고
    • An analysis of the XSL algorithm
    • B. Roy, editor LNCS Springer-Verlag
    • C. Cid and G. Leurent. An Analysis of the XSL Algorithm. In B. Roy, editor, Proceedings of Asiacrypt 2005, LNCS, volume 3788, pages 333-352, Springer-Verlag, 2005.
    • (2005) Proceedings of Asiacrypt 2005 , vol.3788 , pp. 333-352
    • Cid, C.1    Leurent, G.2
  • 7
    • 26444546862 scopus 로고    scopus 로고
    • Small scale variants of the AES
    • H. Gilbert and H. Handschuh, editors LNCS Springer-Verlag
    • C. Cid, S. Murphy, and M.J.B. Robshaw. Small Scale Variants of the AES. In H. Gilbert and H. Handschuh, editors, Proceedings of FSE 2005, LNCS, volume 3557, pages 145-162, Springer-Verlag, 2005.
    • (2005) Proceedings of FSE 2005 , vol.3557 , pp. 145-162
    • Cid, C.1    Murphy, S.2    Robshaw, M.J.B.3
  • 8
    • 33746095782 scopus 로고    scopus 로고
    • VSH, an efficient and provable collision-resistant hash function
    • S. Vaudenay, editor LNCS Springer-Verlag
    • S. Contini, A.K. Lenstra, and R. Steinfeld. VSH, an Efficient and Provable Collision-Resistant Hash Function. In S. Vaudenay, editor, Proceedings of Eurocrypt 2006, LNCS, volume 4004, pages 165-182, Springer-Verlag, 2006.
    • (2006) Proceedings of Eurocrypt 2006 , vol.4004 , pp. 165-182
    • Contini, S.1    Lenstra, A.K.2    Steinfeld, R.3
  • 9
    • 84958765510 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with overdefined systems of equations
    • Y. Zheng, editor LNCS Springer-Verlag
    • N. Courtois and J. Pieprzyk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In Y. Zheng, editor, Proceedings of Asiacrypt 2002, LNCS, volume 2501, pages 267-287, Springer-Verlag, 2002.
    • (2002) Proceedings of Asiacrypt 2002 , vol.2501 , pp. 267-287
    • Courtois, N.1    Pieprzyk, J.2
  • 10
    • 84947444236 scopus 로고    scopus 로고
    • The block cipher square
    • E. Biham, editor LNCS Springer-Verlag
    • J. Daemen, L. Knudsen, and V. Rijmen. The Block Cipher Square. In E. Biham, editor, Proceedi ngs of FSE '97, LNCS, volume 1267, pages 149-165, Springer-Verlag, 1997.
    • (1997) Proceedi Ngs of FSE '97 , vol.1267 , pp. 149-165
    • Daemen, J.1    Knudsen, L.2    Rijmen, V.3
  • 11
    • 84887315591 scopus 로고    scopus 로고
    • The Stream Cipher Project: eSTREAM
    • ECRYPT Network of Excellence. The Stream Cipher Project: eSTREAM. Available via www.ecrypt.eu.org/stream.
    • ECRYPT Network of Excellence
  • 12
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • M. Joye and J.-J. Quisquater, editors LNCS Springer Verlag
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong Authentication for RFID Systems Using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Proceedings of CHES 2004, LNCS, volume 3156, pages 357-370, Springer Verlag, 2004.
    • (2004) Proceedings of CHES 2004 , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 14
    • 85043791322 scopus 로고
    • An identity-based identification scheme based on discrete logarithms modulo a composite number
    • I. Damgård, editor LNCS Springer-Verlag
    • M. Girault. An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number. In I. Damgård, editor, Proceedings of Eurocrypt '90, LNCS, Volume 473, pages 481-486, Springer-Verlag, 1990.
    • (1990) Proceedings of Eurocrypt '90 , vol.473 , pp. 481-486
    • Girault, M.1
  • 17
    • 84944045582 scopus 로고    scopus 로고
    • Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator
    • H. Heyes and C. Adams, editors LNCS Springer-Verlag
    • J. Kelsey, B. Schneier, and N. Ferguson. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. In H. Heyes and C. Adams, editors, Proceedings of SAC 1999, LNCS, volume 1758, pages 13-33, Springer-Verlag, 1999.
    • (1999) Proceedings of SAC 1999 , vol.1758 , pp. 13-33
    • Kelsey, J.1    Schneier, B.2    Ferguson, N.3
  • 18
    • 33744929155 scopus 로고    scopus 로고
    • Mcrypton - A lightweight block cipher for security of low-cost RFID tags and sensors
    • J. Song, T. Kwon, and M. Yung, editors LNCS Springer-Verlag
    • C. Lim and T. Korkishko. mCrypton - A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors. In J. Song, T. Kwon, and M. Yung, editors, Workshop on Information Security Applications - WISA'05, LNCS, volume 3786, pages 243-258, Springer-Verlag, 2005.
    • (2005) Workshop on Information Security Applications - WISA'05 , vol.3786 , pp. 243-258
    • Lim, C.1    Korkishko, T.2
  • 19
    • 85028754650 scopus 로고
    • First experimental cryptanalysis of the data encryption standard
    • Y. Desmedt, editor LNCS Springer-Verlag
    • M. Matsui. First Experimental Cryptanalysis of the Data Encryption Standard. In Y. Desmedt, editor, Proceedings of Crypto '94, LNCS, Volume 839, pages 1-11, Springer-Verlag, 1994.
    • (1994) Proceedings of Crypto '94 , vol.839 , pp. 1-11
    • Matsui, M.1
  • 20
    • 4043135942 scopus 로고    scopus 로고
    • August
    • National Institute of Standards and Technology. FIPS 180-2: Secure Hash Standard, August 2002. Available via csrc.nist.gov.
    • (2002) FIPS 180-2: Secure Hash Standard
  • 21
    • 3042644992 scopus 로고    scopus 로고
    • November
    • National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard, November 2001. Available via csrc.nist.gov.
    • (2001) FIPS 197: Advanced Encryption Standard
  • 22
    • 84957640282 scopus 로고    scopus 로고
    • Secuity analysis of a practical "on the fly" authentication and signature generation
    • K. Nyberg, editor LNCS Springer-Verlag
    • G. Poupard and J. Stern. Secuity Analysis of a Practical "on the fly" Authentication and Signature Generation. In K. Nyberg, editor, Proceedings of Eurocrypt '98, LNCS, volume 1403, pages 422-436, Springer-Verlag, 1998.
    • (1998) Proceedings of Eurocrypt '98 , vol.1403 , pp. 422-436
    • Poupard, G.1    Stern, J.2
  • 24
    • 33745777809 scopus 로고    scopus 로고
    • SEA: A scalable encryption algorithm for small embedded applications
    • J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors LNCS Springer-Verlag
    • F.-X. Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater. SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors, Smart Card Research and Applications, Proceedings of CARDIS 2006, LNCS, volume 3928, pages 222-236, Springer-Verlag.
    • Smart Card Research and Applications, Proceedings of CARDIS 2006 , vol.3928 , pp. 222-236
    • Standaert, F.-X.1    Piret, G.2    Gershenfeld, N.3    Quisquater, J.-J.4
  • 25
    • 84869815133 scopus 로고
    • TEA, a tiny encryption algorithm
    • B. Preneel, editor LNCS Springer-Verlag
    • D. Wheeler and R. Needham. TEA, a Tiny Encryption Algorithm. In B. Preneel, editor, Proceedi ngs of FSE 1994, LNCS, volume 1008, pages 363-366, Springer-Verlag, 1994.
    • (1994) Proceedi Ngs of FSE 1994 , vol.1008 , pp. 363-366
    • Wheeler, D.1    Needham, R.2
  • 26
    • 15744395962 scopus 로고    scopus 로고
    • October Correction to XTEA. October
    • D. Wheeler and R. Needham. TEA extensions. October, 1997. (Also Correction to XTEA. October, 1998.) Available via www.ftp.cl.cam.ac.uk/ftp/ users/djw3/.
    • (1997) TEA Extensions
    • Wheeler, D.1    Needham, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.