-
1
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Springer-Verlag
-
Eli Biham, New Types of Cryptanalytic Attacks Using Related Keys, Journal of Cryptology, Vol. 7, No. 4, pp. 229–246, Springer-Verlag, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.4
, pp. 229-246
-
-
Biham, E.1
-
2
-
-
35048892549
-
Near-Collisions of SHA-0, Advances in Cryptology
-
Springer-Verlag
-
Eli Biham, Rafi Chen, Near-Collisions of SHA-0, Advances in Cryptology, proceedings of CRYPTO 2004, Lecture Notes in Computer Science 3152, pp. 290–305, Springer-Verlag, 2004.
-
(2004)
Proceedings of CRYPTO 2004, Lecture Notes in Computer Science
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
3
-
-
24944584156
-
Collisions of SHA-0 and Reduced SHA-1, Advances in Cryptology, proceedings of EUROCRYPT 2005
-
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby, Collisions of SHA-0 and Reduced SHA-1, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3621, pp. 36–57, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
4
-
-
84945132264
-
The Rectangle Attack – Rectangling the Serpent
-
Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, The Rectangle Attack – Rectangling the Serpent, Advances in Cryptology, proceedings of EUROCRYPT ’01, Lecture Notes in Computer Science 2045, pp. 340–357, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology, Proceedings of EUROCRYPT ’01, Lecture Notes in Computer Science
, vol.2045
, pp. 340-357
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
5
-
-
84949456804
-
New Results on Boomerang and Rectangle Attacks
-
Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, New Results on Boomerang and Rectangle Attacks, proceedings of Fast Software Encryption 9, Lecture Notes in Computer Science 2365, pp. 1–16, Springer-Verlag, 2002.
-
(2002)
Proceedings of Fast Software Encryption 9, Lecture Notes in Computer Science
, vol.2365
, pp. 1-16
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
6
-
-
0242570832
-
Rectangle Attacks on 49-Round SHACAL-1
-
Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, Rectangle Attacks on 49-Round SHACAL-1, proceedings of Fast Software Encryption 10, Lecture Notes in Computer Science 2887, pp. 22–35, Springer-Verlag, 2003.
-
(2003)
Proceedings of Fast Software Encryption 10, Lecture Notes in Computer Science
, vol.2887
, pp. 22-35
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
7
-
-
24944515451
-
Related-Key Boomerang and Rectangle Attacks
-
Springer-Verlag
-
Eli Biham, Orr Dunkelman, Nathan Keller, Related-Key Boomerang and Rectangle Attacks, Advances in Cryptology, proceedings of EUROCRYPT ’05, Lecture Notes in Computer Science 3494, pp. 507–525, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology, Proceedings of EUROCRYPT ’05, Lecture Notes in Computer Science
, vol.3494
, pp. 507-525
-
-
Biham, E.1
Dunkelman, O.2
Keller, N.3
-
9
-
-
85025806786
-
-
Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag
-
Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
-
(1993)
-
-
Biham, E.1
Shamir, A.2
-
10
-
-
84957610784
-
Slide Attacks, proceedings of Fast Software Encryption 6
-
Springer-Verlag
-
Alex Biryukov, David Wagner, Slide Attacks, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 245–259, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 245-259
-
-
Biryukov, A.1
Wagner, D.2
-
11
-
-
85025809672
-
Advanced Slide Attacks, Advances in Cryptology
-
Springer-Verlag
-
Alex Biryukov, David Wagner, Advanced Slide Attacks, Advances in Cryptology, proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science 1807, pp. 586–606, Springer-Verlag, 2000.
-
(2000)
Proceedings of EUROCRYPT 2000, Lecture Notes in Computer Science
, vol.1807
, pp. 586-606
-
-
Biryukov, A.1
Wagner, D.2
-
12
-
-
84957643546
-
Differential Collisions in SHA-0, Advances in Cryptology
-
Springer-Verlag
-
Florent Chabaud, Antoine Joux, Differential Collisions in SHA-0, Advances in Cryptology, proceedings of CRYPTO 1998, Lecture Notes in Computer Science 1462, pp. 56–71, Springer-Verlag, 1998.
-
(1998)
Proceedings of CRYPTO 1998, Lecture Notes in Computer Science
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
13
-
-
85025809375
-
Related-Key Rectangle Attack on the Full SHACAL-1
-
appear in Lecture Notes in Computer Science
-
Orr Dunkelman, Nathan Keller, Jongsung Kim, Related-Key Rectangle Attack on the Full SHACAL-1, accepted to Selected Areas in Cryptography 2006, to appear in Lecture Notes in Computer Science.
-
(2006)
Accepted to Selected Areas in Cryptography
-
-
Dunkelman, O.1
Keller, N.2
Kim, J.3
-
14
-
-
84949982494
-
Slide Attacks with a Known-Plaintext Cryptanalysis
-
Springer-Verlag
-
Soichi Furuya, Slide Attacks with a Known-Plaintext Cryptanalysis, proceedings of Information and Communication Security 2001, Lecture Notes in Computer Science 2288, pp. 214–225, Springer-Verlag, 2002.
-
(2002)
Proceedings of Information and Communication Security 2001, Lecture Notes in Computer Science
, vol.2288
, pp. 214-225
-
-
Furuya, S.1
-
15
-
-
84937572686
-
Analysis of SHA-1 in Encryption Mode, proceedings of CT-RSA 2001
-
Helena Handschuh, Lars R. Knudsen, Matthew J. Robshaw, Analysis of SHA-1 in Encryption Mode, proceedings of CT-RSA 2001, Springer-Verlag Lecture Notes in Computer Science, vol. 2020, pp. 70–83, 2001.
-
(2001)
Springer-Verlag Lecture Notes in Computer Science
, vol.2020
, pp. 70-83
-
-
Handschuh, H.1
Knudsen, L.R.2
Robshaw, M.J.3
-
17
-
-
26444515034
-
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
-
Springer-Verlag
-
Seokhie Hong, Jongsung Kim, Guil Kim, Sangjin Lee, Bart Preneel, Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192, proceedings of Fast Software Encryption 12, Lecture Notes in Computer Science 3557, pp. 368–383, Springer-Verlag, 2005.
-
(2005)
Proceedings of Fast Software Encryption 12, Lecture Notes in Computer Science
, vol.3557
, pp. 368-383
-
-
Hong, S.1
Kim, J.2
Kim, G.3
Lee, S.4
Preneel, B.5
-
18
-
-
84974707257
-
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
-
Springer-Verlag
-
John Kelsey, Tadayoshi Kohno, Bruce Schneier, Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent, proceedings of Fast Software Encryption 7, Lecture Notes in Computer Science 1978, pp. 75–93, Springer-Verlag, 2000.
-
(2000)
Proceedings of Fast Software Encryption 7, Lecture Notes in Computer Science
, vol.1978
, pp. 75-93
-
-
Kelsey, J.1
Kohno, T.2
Schneier, B.3
-
19
-
-
67650338267
-
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
-
Springer-Verlag
-
John Kelsey, Bruce Schneier, David Wagner, Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Advances in Cryptology, proceedings of CRYPTO ’96, Lecture Notes in Computer Science 1109, pp. 237–251, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology, Proceedings of CRYPTO ’96, Lecture Notes in Computer Science
, vol.1109
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
20
-
-
35048894987
-
The Related-Key Rectangle Attack — Application to SHACAL-1
-
Springer-Verlag
-
Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong, The Related-Key Rectangle Attack — Application to SHACAL-1, proceedings of ACISP 2004, Lecture Notes in Computer Science 3108, pp. 123–136, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACISP 2004, Lecture Notes in Computer Science
, vol.3108
, pp. 123-136
-
-
Kim, J.1
Kim, G.2
Hong, S.3
Lee, S.4
Hong, D.5
-
21
-
-
84958740228
-
Amplified Boomerang Attack against Reduced-Round SHACAL, Advances in Cryptology
-
Springer-Verlag
-
Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung, Amplified Boomerang Attack against Reduced-Round SHACAL, Advances in Cryptology, proceedings of ASIACRYPT 2002, Lecture Notes in Computer Science 2501, pp. 243-253, Springer-Verlag, 2002.
-
(2002)
Proceedings of ASIACRYPT 2002, Lecture Notes in Computer Science
, vol.2501
, pp. 243-253
-
-
Kim, J.1
Moon, D.2
Lee, W.3
Hong, S.4
Lee, S.5
Jung, S.6
-
22
-
-
35048892576
-
Cryptanalysis of LOKI91, proceedings of Auscrypt 1992
-
Springer-Verlag
-
Lars R. Knudsen, Cryptanalysis of LOKI91, proceedings of Auscrypt 1992, Lecture Notes in Computer Science 718, pp. 196–208, Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.718
, pp. 196-208
-
-
Knudsen, L.R.1
-
23
-
-
0242403489
-
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5
-
Springer-Verlag
-
Markku-Juhani O. Saarinen, Cryptanalysis of Block Ciphers Based on SHA-1 and MD5, proceedings of Fast Software Encryption 10, Lecture Notes in Computer Science 2887, pp. 36–44, Springer-Verlag, 2003.
-
(2003)
Proceedings of Fast Software Encryption 10, Lecture Notes in Computer Science
, vol.2887
, pp. 36-44
-
-
Saarinen, M.-J.O.1
-
24
-
-
85025812732
-
New European Schemes for Signatures
-
NESSIE – New European Schemes for Signatures, Integrity and Encryption. http://www.nessie.eu.org/nessie
-
Integrity and Encryption
-
-
-
29
-
-
84945126868
-
The Boomerang Attack, proceedings of Fast Software Encryption 6
-
David Wagner, The Boomerang Attack, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 156–170, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1636
, pp. 156-170
-
-
Wagner, D.1
-
30
-
-
85025832410
-
-
Cryptographic Hash Workshop, NIST, Gaithersburg
-
Xiaoyun Wang, Andrew C. Yao, Frances Yao, Cryptanalysis on SHA-1, Cryptographic Hash Workshop, NIST, Gaithersburg, 2005.
-
(2005)
Cryptanalysis on SHA-1
-
-
Wang, X.1
Yao, A.C.2
Yao, F.3
-
31
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology, proceedings of EUROCRYPT 2005
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 1–18, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
32
-
-
33745171465
-
Finding Collisions in the Full SHA-1, Advances in Cryptology, proceedings of CRYPTO 2005
-
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology, proceedings of CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 17–36, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Hongbo, Y.3
-
33
-
-
24944591357
-
How to Break MD5 and Other Hash Functions, Advances in Cryptology, proceedings of EUROCRYPT 2005
-
Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology, proceedings of EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 19–35, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
34
-
-
33745122987
-
Efficient Collision Search Attacks on SHA-0, Advances in Cryptology, proceedings of CRYPTO 2005
-
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology, proceedings of CRYPTO 2005, Lecture Notes in Computer Science 3621, pp. 1–16, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Hongbo, Y.2
Yin, Y.L.3
|