메뉴 건너뛰기




Volumn 1636, Issue , 1999, Pages 156-170

The boomerang attack

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN;

EID: 84945126868     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48519-8_12     Document Type: Conference Paper
Times cited : (451)

References (25)
  • 3
    • 84957624174 scopus 로고    scopus 로고
    • Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials
    • to appear
    • E. Biham, A. Biryukov, A. Shamir. “Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials,” EUROCRYPT'99, to appear.
    • EUROCRYPT'99
    • Biham, E.1    Biryukov, A.2    Shamir, A.3
  • 10
    • 84957656661 scopus 로고
    • A chosen plaintext attack of the 16-round Khufu cryptosystem
    • Springer-Verlag
    • H. Gilbert and P. Chauvaud, “A chosen plaintext attack of the 16-round Khufu cryptosystem," CRYPTO'94, LNCS 839, Springer-Verlag, 1994.
    • (1994) CRYPTO'94, LNCS 839
    • Gilbert, H.1    Chauvaud, P.2
  • 12
    • 0011209561 scopus 로고
    • Differential-linear cryptanalysis
    • LNCS, Springer-Verlag
    • M. Hellman and S. Langford., “Differential-linear cryptanalysis," CRYPTO'94, LNCS 839, Springer-Verlag, 1994.
    • (1994) CRYPTO'94 , vol.839
    • Hellman, M.1    Langford, S.2
  • 13
    • 0006540774 scopus 로고    scopus 로고
    • Related-Key Cryptanalysis of 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
    • Springer-Verlag
    • J. Kelsey, B. Schneier, D. Wagner, “Related-Key Cryptanalysis of 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA," ICICS'97, Springer-Verlag, 1997.
    • (1997) ICICS'97
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 16
    • 0041863249 scopus 로고
    • Higher Order Derivations and Differential Cryptanalysis
    • Kluwer Academic Publishers
    • X. Lai, “Higher Order Derivations and Differential Cryptanalysis," Commu- nications and Cryptography: Two Sides of One Tapestry, Kluwer Academic Publishers, 1994, pp. 227-233.
    • (1994) Commu- Nications and Cryptography: Two Sides of One Tapestry , pp. 227-233
    • Lai, X.1
  • 17
    • 0005270932 scopus 로고
    • Fast Software Encryption Functions
    • Springer-Verlag
    • R. C. Merkle, “Fast Software Encryption Functions", CRYPTO'90, Springer-Verlag, 1990.
    • (1990) CRYPTO'90
    • Merkle, R.C.1
  • 19
    • 84957698788 scopus 로고    scopus 로고
    • Skipjack and KEA algorithm specifications," May
    • NSA, “Skipjack and KEA algorithm specifications," May 1998. Available from http://csrc.ncsl.nist.gov/encryption/skipjack-1.pdf.
    • (1998)
  • 22
    • 84957653990 scopus 로고    scopus 로고
    • A cheap paradigm for block cipher strengthening
    • S. Vaudenay, “A cheap paradigm for block cipher strengthening," LIENS tech report 97-3, 1997.
    • (1997) LIENS Tech Report , pp. 97-103
    • Vaudenay, S.1
  • 23
    • 78649840429 scopus 로고    scopus 로고
    • Provable Security for Block Ciphers by Decorrelation
    • Springer-Verlag LNCS
    • S. Vaudenay, “Provable Security for Block Ciphers by Decorrelation," STACS'98, Springer-Verlag LNCS 1373, 1998.
    • (1998) STACS'98 , vol.1373
    • Vaudenay, S.1
  • 25
    • 84947917071 scopus 로고    scopus 로고
    • Reinventing the Travois: Encryption/ MAC in 30 ROM Bytes
    • LNCS
    • G. Yuval, “Reinventing the Travois: Encryption/ MAC in 30 ROM Bytes," FSE'97, LNCS 1267, 1997.
    • (1997) FSE'97 , vol.1267
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.