-
1
-
-
84947913669
-
Cryptanalysis of Ladder-DES
-
E. Biham, editor, Haifa, Israel, 20-22 Jan, Springer-Verlag
-
E. Biham. Cryptanalysis of Ladder-DES. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, Volume 1267 of Lecture Notes in Computer Science, pages 134-138, Haifa, Israel, 20-22 Jan. 1997. Springer-Verlag.
-
(1997)
Fast Software Encryption: 4Th International Workshop, Volume 1267 of Lecture Notes in Computer Science
, pp. 134-138
-
-
Biham, E.1
-
2
-
-
84957694360
-
Miss in the middle attacks on IDEA and Khufu
-
L. Knudsen, editor, Rome, Italy, Springer-Verlag
-
E. Biham, A. Biryukov, and A. Shamir. Miss in the middle attacks on IDEA and Khufu. In L. Knudsen, editor, Fast Software Encryption, 6th international Workshop, Volume 1636 of Lecture Notes in Computer Science, pages 124-138, Rome, Italy, 1999. Springer-Verlag.
-
(1999)
Fast Software Encryption, 6Th International Workshop, Volume 1636 of Lecture Notes in Computer Science
, pp. 124-138
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84945162919
-
-
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms-Document 2, December 23
-
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms-Document 2: KASUMI Specification, Version 1.0. 3G TS 35.202, December 23, 1999. http://www.etsi.org/dvbandca/3GPP/3GPPconditions.html.
-
(1999)
KASUMI Specification, Version 1.0. 3G TS 35.202
-
-
-
5
-
-
0037605437
-
-
Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway
-
L. R. Knudsen. DEAL-A 128-bit block cipher. Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb. 1998.
-
(1998)
DEAL-A 128-Bit Block Cipher
-
-
Knudsen, L.R.1
-
7
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
T. Helleseth, editor, Berlin, Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology - EuroCrypt ‘93, Volume 765 of Lecture Notes in Computer Science, pages 386-397, Berlin, 1993. Springer-Verlag.
-
(1993)
Advances in Cryptology - Eurocrypt ‘93, Volume 765 of Lecture Notes in Computer Science
, pp. 386-397
-
-
Matsui, M.1
-
8
-
-
84947904428
-
-
New block encryption algorithm MISTY. In E. Biham, editor, Haifa, Israel, 20-22 Jan, SpringerVerlag
-
M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, Volume 1267 of Lecture Notes in Computer Science, pages 54-68, Haifa, Israel, 20-22 Jan. 1997. SpringerVerlag.
-
(1997)
Fast Software Encryption: 4Th International Workshop, Volume 1267 of Lecture Notes in Computer Science
, pp. 54-68
-
-
Matsui, M.1
-
9
-
-
0030686751
-
On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis
-
January
-
K. Sakurai and Y. Zheng. On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis. IEICE Trans. Fundamentals, E80-A (1):19-24, January 1997.
-
(1997)
IEICE Trans. Fundamentals, E80-A
, Issue.1
, pp. 19-24
-
-
Sakurai, K.1
Zheng, Y.2
-
10
-
-
25044434175
-
-
Technical Report ISEC98-4, Institute of Electronics, Information and Communication Engineers (IEICE
-
M. Sugita. Higher order differential attack of block ciphers MISTY1,2. Technical Report ISEC98-4, Institute of Electronics, Information and Communication Engineers (IEICE), 1998.
-
(1998)
Higher Order Differential Attack of Block Ciphers MISTY1,2
-
-
Sugita, M.1
-
12
-
-
84957686830
-
Strength of MISTY1 without FL function for higher order differential attack
-
M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, Hawaii, USA, Springer Verlag
-
H. Tanaka, K. Hisamatsu, and T. Kaneko. Strength of MISTY1 without FL function for higher order differential attack. In M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, Proc. Applied algebra, algebraic algorithms, and error-correcting codes: 13th international symposium, AAECC-13, Volume 1719 of Lecture Notes in Computer Science, pages 221-230, Hawaii, USA, 1999. Springer Verlag
-
(1999)
Proc. Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes: 13Th International Symposium, AAECC-13, Volume 1719 of Lecture Notes in Computer Science
, pp. 221-230
-
-
Tanaka, H.1
Hisamatsu, K.2
Kaneko, T.3
|