-
1
-
-
84983089516
-
The security of cipher block chaining message authentication codes
-
Springer-Verlag
-
M. Bellare, J. Kilian, and P. R. Rogaway, The security of cipher block chaining message authentication codes, Advances in Cryptology-Crypto’94, LNCS 839, Springer-Verlag, 1994, pp. 341-358.
-
(1994)
Advances in Cryptology-Crypto’94
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.R.3
-
2
-
-
0031351741
-
A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, 38th Symposium on Foundations of Computer Science(FOCS)
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation, 38th Symposium on Foundations of Computer Science(FOCS), IEEE Computer Society, 1997, pp. 394-403.
-
(1997)
IEEE Computer Society
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
84946862420
-
-
Federal Information Processing Standards Publication 81, December
-
FIPS PUB 81, DES Modes of Operation, Federal Information Processing Standards Publication 81, December 2, 1980.
-
(1980)
DES Modes of Operation
, vol.2
-
-
-
5
-
-
84946848377
-
Round security and superpseudorandomness of MISTY type structure
-
Yokohama
-
T. Iwata, T. Yoshino, T. Yuasa, and K. Kurosawa, Round security and superpseudorandomness of MISTY type structure, Preproceedings of Fast Software Encryption workshop 2001, (2001, Yokohama), pp. 245-259.
-
(2001)
Preproceedings of Fast Software Encryption Workshop 2001
, pp. 245-259
-
-
Iwata, T.1
Yoshino, T.2
Yuasa, T.3
Kurosawa, K.4
-
6
-
-
84958755506
-
-
Springer-Verlag
-
J. S. Kang, O. Y. Yi, D. W. Hong, and H. S. Cho, Pseudorandomness of MISTYtype transformations and the block cipher KASUMI, ACISP2001, LNCS 2119, Springer-Verlag, 2001, pp. 60-73.
-
(2001)
Pseudorandomness of Mistytype Transformations and the Block Cipher KASUMI, ACISP2001
, vol.2119
, pp. 60-73
-
-
Kang, J.S.1
Yi, O.Y.2
Hong, D.W.3
Cho, H.S.4
-
7
-
-
0023984964
-
Howto construct pseudorandom permutations and pseudorandom functions
-
M. Luby and C. Rackoff, Howto construct pseudorandom permutations and pseudorandom functions, SIAM J. Comput., Vol. 17, 1988, pp. 189-203.
-
(1988)
SIAM J. Comput.
, vol.17
, pp. 189-203
-
-
Luby, M.1
Rackoff, C.2
-
8
-
-
84958979414
-
Newp ermutation of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis
-
Springer- Verlag
-
M. Matsui, Newp ermutation of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis, Fast Software Encryption, LNCS 1039, Springer- Verlag, 1996, pp. 205-218.
-
(1996)
Fast Software Encryption
, pp. 205-218
-
-
Matsui, M.1
-
9
-
-
84947904428
-
New Block Encryption Algorithm MISTY
-
Springer-Verlag
-
M. Matsui, New Block Encryption Algorithm MISTY, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 54-68.
-
(1997)
Fast Software Encryption’97
, vol.1267
, pp. 54-68
-
-
Matsui, M.1
-
10
-
-
0003064824
-
On the construction of pseurandom permutations: Luby-Rackoff revisited
-
M. Naor and O. Reingold, On the construction of pseurandom permutations: Luby-Rackoff revisited, J. Cryptology, Vol. 12, 1999, pp. 29-66.
-
(1999)
J. Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
11
-
-
0030686751
-
On non-pseudorandomness from block ciphers with provable immunity against linear cryptanaysis
-
K. Sakurai and Y. Zheng, On non-pseudorandomness from block ciphers with provable immunity against linear cryptanaysis, IEICE Trans. Fundamentals, Vol. E80-A, No. 1, 1997, pp. 19-24.
-
(1997)
IEICE Trans. Fundamentals
, vol.E80-A
, Issue.1
, pp. 19-24
-
-
Sakurai, K.1
Zheng, Y.2
-
13
-
-
84946824507
-
Optimized Self- Synchronizing Mode of Operation
-
April 2
-
A. Alkassar, A. Geralay, B. Pfitzmann, and A. R. Sadeghi, Optimized Self- Synchronizing Mode of Operation, Preproceedings of 8th Fast Software Encryption Workshop, April 2, 2001, pp. 82-96.
-
(2001)
Preproceedings of 8Th Fast Software Encryption Workshop
, pp. 82-96
-
-
Alkassar, A.1
Geralay, A.2
Pfitzmann, B.3
Sadeghi, A.R.4
|