-
1
-
-
84957649725
-
Improved Cryptanalysis of RC5
-
Springer-Verlag
-
A. Biryukov, and E. Kushilevitz, “Improved Cryptanalysis of RC5”, Advances in Cryptology-Proceedings of EUROCRYPT’98, Lecture Notes in Computer Science, 1403(1998), Springer-Verlag, 85-99.
-
(1998)
Advances in Cryptology-Proceedings of EUROCRYPT’98, Lecture Notes in Computer Science
, vol.1403
, pp. 85-99
-
-
Biryukov, A.1
Kushilevitz, E.2
-
2
-
-
84957695618
-
Linear Cryptanalysis of RC5 and RC6
-
Springer-Verlag
-
J. Borst, B. Preneel, and J. Vandewalle,”Linear Cryptanalysis of RC5 and RC6”, Proceedings of Fast Software Encryption, Lecture Notes in Computer Science, 1636(1999), Springer-Verlag, 16-30.
-
(1999)
Proceedings of Fast Software Encryption, Lecture Notes in Computer Science
, vol.1636
, pp. 16-30
-
-
Borst, J.1
Preneel, B.2
Vandewalle, J.3
-
4
-
-
84957644147
-
On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm
-
Springer-Verlag
-
B. Kaliski, and Y. Lin, “On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm”, Advances in Cryptology-Proceedings of CRYPTO’95, Lecture Notes in Computer Science, 963(1995), Springer-Verlag, 171-184.
-
(1995)
Advances in Cryptology-Proceedings of CRYPTO’95, Lecture Notes in Computer Science
, vol.963
, pp. 171-184
-
-
Kaliski, B.1
Lin, Y.2
-
5
-
-
84957633461
-
Mod n Cryptanalysis, with applications against RC5P and M6
-
Springer-Verlag
-
J. Kelsey, B. Schneier, and D. Wagner, “Mod n Cryptanalysis, with applications against RC5P and M6”, Proceedings of Fast Software Encryption, Lecture Notes in Computer Science, 1636(1999), Springer-Verlag, 139-155.
-
(1999)
Proceedings of Fast Software Encryption, Lecture Notes in Computer Science
, vol.1636
, pp. 139-155
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
6
-
-
84955594777
-
Improved Differential Attacks on RC5
-
Springer-Verlag
-
L. Knudsen, and W. Meier, “Improved Differential Attacks on RC5”, Advances in Cryptology-Proceedings of CRYPTO’96, Lecture Notes in Computer Science, 1109(1996), Springer-Verlag, 216-228.
-
(1996)
Advances in Cryptology-Proceedings of CRYPTO’96, Lecture Notes in Computer Science
, vol.1109
, pp. 216-228
-
-
Knudsen, L.1
Meier, W.2
-
7
-
-
84855918241
-
Correlations in RC6 with a reduced number of rounds
-
Springer-Verlag, to appear
-
L. Knudsen, and W. Meier, “Correlations in RC6 with a reduced number of rounds”, Proceedings of Fast Software Encryption, Lecture Notes in Computer Science, Springer-Verlag, to appear.
-
Proceedings of Fast Software Encryption, Lecture Notes in Computer Science
-
-
Knudsen, L.1
Meier, W.2
-
8
-
-
0003657590
-
-
Seminumerical Algorithms, 2nd ed., Addison-Wesley, Reading, Mass
-
D. Knuth, The art of computer programming, vol. 2, Seminumerical Algorithms, 2nd ed., Addison-Wesley, Reading, Mass. 1981.
-
(1981)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.1
-
11
-
-
84948990100
-
The RC5 Encryption Algorithm
-
Springer-Verlag
-
R. Rivest, “The RC5 Encryption Algorithm”, Proceedings of Fast Software Encryption, Lecture Notes in Computer Science, 1008(1995), Springer-Verlag, 86-96.
-
(1995)
Proceedings of Fast Software Encryption, Lecture Notes in Computer Science
, vol.1008
, pp. 86-96
-
-
Rivest, R.1
|