메뉴 건너뛰기




Volumn 1372, Issue , 1998, Pages 17-31

Higher order differential attack of a CAST cipher

Author keywords

[No Author keywords available]

Indexed keywords

LINEAR SYSTEMS;

EID: 84947901764     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-69710-1_2     Document Type: Conference Paper
Times cited : (36)

References (19)
  • 1
    • 0005755797 scopus 로고    scopus 로고
    • Constructing Symmetric Ciphers Using the CAST Design Procedure
    • Nov, Kluwer Academic Publishers
    • C.M. Adams, “Constructing Symmetric Ciphers Using the CAST Design Procedure," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.283-316, Kluwer Academic Publishers, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.3 , pp. 283-316
    • Adams, C.M.1
  • 2
    • 10044240090 scopus 로고    scopus 로고
    • The CAST-128 Encryption Algorithm
    • NetworkWorking Group, Internet Engineering Task Force, May
    • C.M. Adams, “The CAST-128 Encryption Algorithm," Request for Comments (RFC) 2144, NetworkWorking Group, Internet Engineering Task Force, May, 1997.
    • (1997) Request for Comments (RFC) , vol.2144
    • Adams, C.M.1
  • 5
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • Springer-Verlag
    • E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, Vol.4, No.1, pp.3-72, Springer-Verlag, 1991.
    • (1991) Journal of Cryptology , vol.4 , Issue.1 , pp. 3-72
    • Biham, E.1    Shamir, A.2
  • 8
    • 84947916887 scopus 로고
    • A known-plaintext attack of FEAL-4 based on the system of linear equations on difference (Extended Abstract)
    • Springer- Verlag
    • T. Kaneko, “A known-plaintext attack of FEAL-4 based on the system of linear equations on difference (Extended Abstract)," Advances in Cryptology- ASIACRYPT'91, Lecture Notes in Computer Science 739, pp.485-488, Springer- Verlag, 1993.
    • (1993) Advances in Cryptology- ASIACRYPT'91, Lecture Notes in Computer Science , vol.739 , pp. 485-488
    • Kaneko, T.1
  • 9
    • 0343324991 scopus 로고
    • “A Known Plaintext Cryptanalytic Attack of FEAL-4," (In Japanese)
    • May
    • T. Kaneko, “A Known Plaintext Cryptanalytic Attack of FEAL-4," (in Japanese), IEICE Trans. Vol.76-A, No.5, May, pp.781-786, 1993.
    • (1993) IEICE Trans , vol.76-A , Issue.5 , pp. 781-786
    • Kaneko, T.1
  • 10
    • 84947901536 scopus 로고    scopus 로고
    • A New Design Concept for Building Secure Block Ciphers
    • CTU Publishing House
    • K. Kiefer, “A New Design Concept for Building Secure Block Ciphers," In Proceedings of PRAGOCRYPT'96, pp.30-41, CTU Publishing House, 1996.
    • (1996) Proceedings of PRAGOCRYPT'96 , pp. 30-41
    • Kiefer, K.1
  • 12
    • 0041863249 scopus 로고
    • Higher Order Derivatives and Differential Cryptanalysis
    • Kluwer Academic Publishers
    • X. Lai, “Higher Order Derivatives and Differential Cryptanalysis," Communications and Cryptography, pp.227-233, Kluwer Academic Publishers, 1994.
    • (1994) Communications and Cryptography , pp. 227-233
    • Lai, X.1
  • 13
    • 0000949759 scopus 로고    scopus 로고
    • Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
    • Nov, Kluwer Academic Publishers
    • J. Lee, H.M. Heys, S.E. Tavares, “Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.267-282, Kluwer Academic Publishers, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.3 , pp. 267-282
    • Lee, J.1    Heys, H.M.2    Tavares, S.E.3
  • 14
    • 0029632010 scopus 로고
    • Provable Security Against a Differential Attack
    • Springer-Verlag
    • K. Nyberg and L.R. Knudsen, “Provable Security Against a Differential Attack," Journal of Cryptology, Vol.8, No.1, pp.27-37, Springer-Verlag, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 27-37
    • Nyberg, K.1    Knudsen, L.R.2
  • 16
    • 1842789567 scopus 로고    scopus 로고
    • On Weaknesses of Non-surjective Round Functions
    • Nov, Kluwer Academic Publishers
    • V. Rijmen, B. Preneel, and E. De Win “On Weaknesses of Non-surjective Round Functions," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.253-266, Kluwer Academic Publishers, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.3 , pp. 253-266
    • Rijmen, V.1    Preneel, B.2    De Win, E.3
  • 18
    • 33746634753 scopus 로고    scopus 로고
    • Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher
    • (to appear in Lecture Notes in Computer Science, Springer-Verlag)
    • T. Shimoyama, S. Moriai, and T. Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher," In Pre-Proceedings of 1997 Information SecurityWorkshop, pp.1-8, 1997. (to appear in Lecture Notes in Computer Science, Springer-Verlag)
    • (1997) Pre-Proceedings of 1997 Information Securityworkshop , pp. 1-8
    • Shimoyama, T.1    Moriai, S.2    Kaneko, T.3
  • 19
    • 38049042096 scopus 로고    scopus 로고
    • Improved Fast Software Implementation of Block Ciphers (Extended Abstract)
    • Beijing, Nov. 1997, Lecture Notes in Computer Science 1334, Springer-Verlag
    • T. Shimoyama, S. Amada, and S. Moriai, “Improved Fast Software Implementation of Block Ciphers (Extended Abstract)," ICICS'97, Beijing, Nov. 1997, Lecture Notes in Computer Science 1334, pp.269-273, Springer-Verlag, 1997.
    • (1997) ICICS'97 , pp. 269-273
    • Shimoyama, T.1    Amada, S.2    Moriai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.