-
3
-
-
84957624174
-
Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials
-
to appear
-
E. Biham, A. Biryukov, A. Shamir. “Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials,” EUROCRYPT'99, to appear.
-
EUROCRYPT'99
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84957710740
-
-
this volume
-
E. Biham, A. Biryukov, A. Shamir. “Miss in the Middle Attacks on IDEA, Khufu, and Khafre," this volume.
-
Miss in the Middle Attacks on IDEA, Khufu, and Khafre
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
84939526305
-
Initial Observations on the Skipjack Encryption Algorithm
-
Springer- Verlag
-
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson, A. Shamir, “Initial Observations on the Skipjack Encryption Algorithm," SAC'98, Springer- Verlag, 1998.
-
(1998)
SAC'98
-
-
Biham, E.1
Biryukov, A.2
Dunkelmann, O.3
Richardson, E.4
Shamir, A.5
-
8
-
-
0346494239
-
-
NIST AES Proposal, Jun 98
-
C. Burwick, D. Coppersmith, E. D'Avignon, R. Gennaro, S. Halevi, C. Jutla, S.M. Matyas, L. O'Connor, M. Peyravian, D. Safford, and N. Zunic, “MARS - A Candidate Cipher for AES," NIST AES Proposal, Jun 98.
-
MARS - A Candidate Cipher for AES
-
-
Burwick, C.1
Coppersmith, D.2
D'avignon, E.3
Gennaro, R.4
Halevi, S.5
Jutla, C.6
Matyas, S.M.7
O'connor, L.8
Peyravian, M.9
Safford, D.10
Zunic, N.11
-
9
-
-
84944047441
-
-
NIST AES Proposal, Jun 98
-
H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay, “Decorrelated Fast Cipher: an AES Candidate," NIST AES Proposal, Jun 98.
-
Decorrelated Fast Cipher: An AES Candidate
-
-
Gilbert, H.1
Girault, M.2
Hoogvorst, P.3
Noilhan, F.4
Pornin, T.5
Poupard, G.6
Stern, J.7
Vaudenay, S.8
-
10
-
-
84957656661
-
A chosen plaintext attack of the 16-round Khufu cryptosystem
-
Springer-Verlag
-
H. Gilbert and P. Chauvaud, “A chosen plaintext attack of the 16-round Khufu cryptosystem," CRYPTO'94, LNCS 839, Springer-Verlag, 1994.
-
(1994)
CRYPTO'94, LNCS 839
-
-
Gilbert, H.1
Chauvaud, P.2
-
12
-
-
0011209561
-
Differential-linear cryptanalysis
-
LNCS, Springer-Verlag
-
M. Hellman and S. Langford., “Differential-linear cryptanalysis," CRYPTO'94, LNCS 839, Springer-Verlag, 1994.
-
(1994)
CRYPTO'94
, vol.839
-
-
Hellman, M.1
Langford, S.2
-
13
-
-
0006540774
-
Related-Key Cryptanalysis of 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
-
Springer-Verlag
-
J. Kelsey, B. Schneier, D. Wagner, “Related-Key Cryptanalysis of 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA," ICICS'97, Springer-Verlag, 1997.
-
(1997)
ICICS'97
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
16
-
-
0041863249
-
Higher Order Derivations and Differential Cryptanalysis
-
Kluwer Academic Publishers
-
X. Lai, “Higher Order Derivations and Differential Cryptanalysis," Commu- nications and Cryptography: Two Sides of One Tapestry, Kluwer Academic Publishers, 1994, pp. 227-233.
-
(1994)
Commu- Nications and Cryptography: Two Sides of One Tapestry
, pp. 227-233
-
-
Lai, X.1
-
17
-
-
0005270932
-
Fast Software Encryption Functions
-
Springer-Verlag
-
R. C. Merkle, “Fast Software Encryption Functions", CRYPTO'90, Springer-Verlag, 1990.
-
(1990)
CRYPTO'90
-
-
Merkle, R.C.1
-
19
-
-
84957698788
-
-
Skipjack and KEA algorithm specifications," May
-
NSA, “Skipjack and KEA algorithm specifications," May 1998. Available from http://csrc.ncsl.nist.gov/encryption/skipjack-1.pdf.
-
(1998)
-
-
-
21
-
-
0011190730
-
Per- formance Comparison of the AES Submissions
-
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, “Per- formance Comparison of the AES Submissions," Second AES Conference, 1999.
-
(1999)
Second AES Conference
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
22
-
-
84957653990
-
A cheap paradigm for block cipher strengthening
-
S. Vaudenay, “A cheap paradigm for block cipher strengthening," LIENS tech report 97-3, 1997.
-
(1997)
LIENS Tech Report
, pp. 97-103
-
-
Vaudenay, S.1
-
23
-
-
78649840429
-
Provable Security for Block Ciphers by Decorrelation
-
Springer-Verlag LNCS
-
S. Vaudenay, “Provable Security for Block Ciphers by Decorrelation," STACS'98, Springer-Verlag LNCS 1373, 1998.
-
(1998)
STACS'98
, vol.1373
-
-
Vaudenay, S.1
-
25
-
-
84947917071
-
Reinventing the Travois: Encryption/ MAC in 30 ROM Bytes
-
LNCS
-
G. Yuval, “Reinventing the Travois: Encryption/ MAC in 30 ROM Bytes," FSE'97, LNCS 1267, 1997.
-
(1997)
FSE'97
, vol.1267
-
-
Yuval, G.1
|