-
1
-
-
84949218850
-
Camellia: A 128-bit block cipher suitable for multiple platforms-design and analysis
-
Springer-Verlag, LNCS 2012
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, Camellia: A 128-bit block cipher suitable for multiple platforms- design and analysis, SAC-2000, LNCS 2012, pp. 39-56, Springer-Verlag, 2001.
-
(2001)
SAC-2000
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
2
-
-
8744301953
-
Cryptanalysys of a partially known cellular automata cryptosystem
-
F. Bao, Cryptanalysys of a partially known cellular automata cryptosystem, IEEE Transactions on Computers, vol. 53, no. 11, pp. 1493-1497, 2004.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.11
, pp. 1493-1497
-
-
Bao, F.1
-
3
-
-
0026397734
-
Differential cryptanalysis of DES like cyptosystems
-
E. Biham, and A. Shamir, Differential cryptanalysis of DES like cyptosystems, Journal of Cryptology, vol. 4, pp. 3-72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
0028494723
-
New types of cryptanalytic attacks using related keys
-
Springer-Verlag, LNCS 765
-
E. Biham, 'New types of cryptanalytic attacks using related keys, Eurocrypt '93, LNCS 765, pp. 229-248, Springer-Verlag, 1994.
-
(1994)
Eurocrypt '93
, pp. 229-248
-
-
Biham, E.1
-
5
-
-
0031366921
-
Comments on theory and application of cellular automata in cryptography
-
S. Blackburn, S. Murphy, and K. Paterson, Comments on theory and application of cellular automata in cryptography, IEEE Transactions on Computers, vol. 46, no. 5, pp. 637-638, 1997.
-
(1997)
IEEE Transactions on Computers
, vol.46
, Issue.5
, pp. 637-638
-
-
Blackburn, S.1
Murphy, S.2
Paterson, K.3
-
6
-
-
0003818882
-
Additive Cellular Automata: Theory and Applications
-
Wiley-IEEE Computer Society Press
-
P. P. Chaudhuri, D. R. Chowdhury, S. Nandi, and S. Chattopadhyay, Additive Cellular Automata: Theory and Applications, Wiley-IEEE Computer Society Press, Vol. 1, 1997.
-
(1997)
, vol.1
-
-
Chaudhuri, P.P.1
Chowdhury, D.R.2
Nandi, S.3
Chattopadhyay, S.4
-
7
-
-
84896946612
-
-
Free Software Implementation
-
Christophe Devine, Free Software Implementation. (http://www.cs.rochester.edu/brown/Crypto/src/AES.c)
-
-
-
Devine, C.1
-
9
-
-
84947929289
-
The interpolation attacks on block ciphers
-
Springer-Verlag, LNCS, 1267
-
T. Jakobson, and L. Knudsen, The interpolation attacks on block ciphers, FSE-97, LNCS 1267, pp. 28-40, Springer-Verlag, 1997.
-
(1997)
FSE-97
, pp. 28-40
-
-
Jakobson, T.1
Knudsen, L.2
-
10
-
-
67650338267
-
Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER and Triple-DES
-
Springer-Verlag, LNCS, 1109
-
J. Kelsey, B. Schneier, and B. Wagner, Key- schedule cryptanalysis of IDEA, G-DES, GOST, SAFER and Triple-DES, Crypto'96, LNCS 1109, pp. 237-251, Springer-Verlag, 1997.
-
(1997)
Crypto'96
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, B.3
-
11
-
-
0031235317
-
Inversion of cellular automata iteration
-
C. K. Koc, and A. M. Apohan, Inversion of cellular automata iteration, IEE Proceedings of Computer and Digital Technique, vol. 144, no. 5, pp. 279-284, 1997.
-
(1997)
IEE Proceedings of Computer and Digital Technique
, vol.144
, Issue.5
, pp. 279-284
-
-
Koc, C.K.1
Apohan, A.M.2
-
12
-
-
0000474763
-
Differential power analysis
-
Springer-Verlag, LNCS, 1666
-
P. Kocher, J. Jaffre, and B. Jun, Differential power analysis, Crypto'99, LNCS 1666, pp. 398-412, Springer-Verlag, 1999.
-
(1999)
Crypto'99
, pp. 398-412
-
-
Kocher, P.1
Jaffre, J.2
Jun, B.3
-
13
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
Springer-Verlag, LNCS, 576
-
X. Lai, and J. L. Massey, Markov ciphers and differential cryptanalysis, Crypto '91, LNCS 576, pp. 17-38, Springer-Verlag, 1992.
-
(1992)
Crypto '91
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
-
14
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Springer-Verlag, LNCS, 765
-
M. Matsui, Linear cryptanalysis method for DES cipher, Eurocrypt '93, LNCS 765, pp.386-397, Springer-Verlag, 1994.
-
(1994)
Eurocrypt '93
, pp. 386-397
-
-
Matsui, M.1
-
15
-
-
84944878354
-
Handbook of Applied Cryptography
-
CRC Press, Oct
-
A. Menezes, P. V. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Oct. 1996
-
(1996)
-
-
Menezes, A.1
Oorschot, P.V.2
Vanstone, S.3
-
16
-
-
49149092091
-
On software implementation of fast DDP- based ciphers
-
N. A. Moldovyan, P. A. Moldovyan, and D.H. Summerville, On software implementation of fast DDP- based ciphers, Internatiol Journal of Network Security, vol. 4, no. 1, pp. 81-89, 2007.
-
(2007)
Internatiol Journal of Network Security
, vol.4
, Issue.1
, pp. 81-89
-
-
Moldovyan, N.A.1
Moldovyan, P.A.2
Summerville, D.H.3
-
17
-
-
0028750092
-
Theory and application of cellular automata in cryptography
-
S. Nandi, B. K. Kar, and P. P. Chaudhuri, Theory and application of cellular automata in cryptography, IEEE Transaction on Computers, vol. 43, no. 12, pp. 1346-1357, 1994.
-
(1994)
IEEE Transaction on Computers
, vol.43
, Issue.12
, pp. 1346-1357
-
-
Nandi, S.1
Kar, B.K.2
Chaudhuri, P.P.3
-
18
-
-
84944078733
-
Cellular automata based cryptosystem (CAC)
-
Springer-Verlag, LNCS, 2513
-
S. Sen, C. Shaw, D. R. Chowdhuri, N. Ganguly, and P. Pal Chaudhuri, Cellular automata based cryptosystem (CAC), ACRI-2002, LNCS 2513, pp. 303-314, Springer-Verlag, 2002.
-
(2002)
ACRI-2002
, pp. 303-314
-
-
Sen, S.1
Shaw, C.2
Chowdhuri, D.R.3
Ganguly, N.4
Pal Chaudhuri, P.5
-
19
-
-
33646836401
-
Reversible cellular automata based encryption
-
Springer-Verlag, LNCS, 3222
-
F. Seredynski, K. Pienkosz, and P. Bouvry, Reversible cellular automata based encryption, NPC '04, LNCS 3222, pp. 411-418, Springer-Verlag, 2004.
-
(2004)
NPC '04
, pp. 411-418
-
-
Seredynski, F.1
Pienkosz, K.2
Bouvry, P.3
-
20
-
-
2642563715
-
Cellular automata computation and secret key cryptography
-
F. Seredynski, P. Bouvry, and A. Y. Zomaya, Cellular automata computation and secret key cryptography, Parallel Computing, vol. 30, pp. 753-766, 2004.
-
(2004)
Parallel Computing
, vol.30
, pp. 753-766
-
-
Seredynski, F.1
Bouvry, P.2
Zomaya, A.Y.3
-
21
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
22
-
-
17444420720
-
High speed networking: Design and implementation of two new DDP-based ciphers
-
Springer-Verlag
-
N. Sklavos, N. A. Moldovyan, and O. Koufopavlou, High speed networking: Design and implementation of two new DDP-based ciphers, Mobile Networks and Applications-MONET, vol. 25, no. 1-2, pp. 219-231, Springer-Verlag, 2005.
-
(2005)
Mobile Networks and Applications-MONET
, vol.25
, Issue.1-2
, pp. 219-231
-
-
Sklavos, N.1
Moldovyan, N.A.2
Koufopavlou, O.3
-
23
-
-
85086814154
-
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES rijndael
-
California
-
F. Standaert, G. Rouvroy, J. Quisquater and J. Legat, A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES rijndael, FPGA-2003, pp. 281-291, California, 2003.
-
(2003)
FPGA-2003
, pp. 281-291
-
-
Standaert, F.1
Rouvroy, G.2
Quisquater, J.3
Legat, J.4
-
24
-
-
35048901993
-
ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware
-
Springer-Verlag, LNCS, 3017
-
F. Standaert, G. Piret, G. Rouvroy, J. Quisquater, and J. Legat, ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware, FSE '04, LNCS 3017, pp. 279-299, Springer-Verlag, 2004.
-
(2004)
FSE '04
, pp. 279-299
-
-
Standaert, F.1
Piret, G.2
Rouvroy, G.3
Quisquater, J.4
Legat, J.5
-
25
-
-
0001566941
-
Invertible cellular automat: A review
-
reprinted with correction as of Oct. 2001
-
T. Toffoli, and N. Margolus, Invertible cellular automat: A review, Physica D, vol. 45, pp. 229-253, (reprinted with correction as of Oct. 2001).
-
Physica D
, vol.45
, pp. 229-253
-
-
Toffoli, T.1
Margolus, N.2
-
26
-
-
84994719216
-
Cryptosystem for lowpower devices
-
Munich, Germany, Apr
-
S. Tripathy, and S. Nandi, Cryptosystem for low-power devices, Turbocoding-2006, Munich, Germany, Apr. 2006.
-
(2006)
Turbocoding-2006
-
-
Tripathy, S.1
Nandi, S.2
-
27
-
-
84992720189
-
Cryptography with Cellular Automata
-
Springer-Verlag, LNCS, 218
-
S. Wolfram, Cryptography with Cellular Automata, Crypto '85, LNCS 218, pp. 429-432, Springer-Verlag, 1986.
-
(1986)
Crypto '85
, pp. 429-432
-
-
Wolfram, S.1
-
28
-
-
46149128523
-
Random sequence generation by cellular automata
-
S. Wolfram, Random sequence generation by cellular automata, Advances in Applied Maths, vol. 7, no. 2, pp. 123-169, 1986.
-
(1986)
Advances in Applied Maths
, vol.7
, Issue.2
, pp. 123-169
-
-
Wolfram, S.1
|