메뉴 건너뛰기




Volumn 2248, Issue , 2001, Pages 255-271

Provable security of KASUMI and 3GPP encryption mode f8

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA;

EID: 84946822383     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45682-1_16     Document Type: Conference Paper
Times cited : (21)

References (13)
  • 1
    • 84983089516 scopus 로고
    • The security of cipher block chaining message authentication codes
    • Springer-Verlag
    • M. Bellare, J. Kilian, and P. R. Rogaway, The security of cipher block chaining message authentication codes, Advances in Cryptology-Crypto’94, LNCS 839, Springer-Verlag, 1994, pp. 341-358.
    • (1994) Advances in Cryptology-Crypto’94 , vol.839 , pp. 341-358
    • Bellare, M.1    Kilian, J.2    Rogaway, P.R.3
  • 2
    • 0031351741 scopus 로고    scopus 로고
    • A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, 38th Symposium on Foundations of Computer Science(FOCS)
    • M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, 38th Symposium on Foundations of Computer Science(FOCS), IEEE Computer Society, 1997, pp. 394-403.
    • (1997) IEEE Computer Society , pp. 394-403
    • Bellare, M.1    Desai, A.2    Jokipii, E.3    Rogaway, P.4
  • 3
    • 84946862420 scopus 로고
    • Federal Information Processing Standards Publication 81, December
    • FIPS PUB 81, DES Modes of Operation, Federal Information Processing Standards Publication 81, December 2, 1980.
    • (1980) DES Modes of Operation , vol.2
  • 7
    • 0023984964 scopus 로고
    • Howto construct pseudorandom permutations and pseudorandom functions
    • M. Luby and C. Rackoff, Howto construct pseudorandom permutations and pseudorandom functions, SIAM J. Comput., Vol. 17, 1988, pp. 189-203.
    • (1988) SIAM J. Comput. , vol.17 , pp. 189-203
    • Luby, M.1    Rackoff, C.2
  • 8
    • 84958979414 scopus 로고    scopus 로고
    • Newp ermutation of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis
    • Springer- Verlag
    • M. Matsui, Newp ermutation of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis, Fast Software Encryption, LNCS 1039, Springer- Verlag, 1996, pp. 205-218.
    • (1996) Fast Software Encryption , pp. 205-218
    • Matsui, M.1
  • 9
    • 84947904428 scopus 로고    scopus 로고
    • New Block Encryption Algorithm MISTY
    • Springer-Verlag
    • M. Matsui, New Block Encryption Algorithm MISTY, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 54-68.
    • (1997) Fast Software Encryption’97 , vol.1267 , pp. 54-68
    • Matsui, M.1
  • 10
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseurandom permutations: Luby-Rackoff revisited
    • M. Naor and O. Reingold, On the construction of pseurandom permutations: Luby-Rackoff revisited, J. Cryptology, Vol. 12, 1999, pp. 29-66.
    • (1999) J. Cryptology , vol.12 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 11
    • 0030686751 scopus 로고    scopus 로고
    • On non-pseudorandomness from block ciphers with provable immunity against linear cryptanaysis
    • K. Sakurai and Y. Zheng, On non-pseudorandomness from block ciphers with provable immunity against linear cryptanaysis, IEICE Trans. Fundamentals, Vol. E80-A, No. 1, 1997, pp. 19-24.
    • (1997) IEICE Trans. Fundamentals , vol.E80-A , Issue.1 , pp. 19-24
    • Sakurai, K.1    Zheng, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.