-
1
-
-
0005755797
-
Constructing Symmetric Ciphers Using the CAST Design Procedure
-
Nov, Kluwer Academic Publishers
-
C.M. Adams, “Constructing Symmetric Ciphers Using the CAST Design Procedure," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.283-316, Kluwer Academic Publishers, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.3
, pp. 283-316
-
-
Adams, C.M.1
-
2
-
-
10044240090
-
The CAST-128 Encryption Algorithm
-
NetworkWorking Group, Internet Engineering Task Force, May
-
C.M. Adams, “The CAST-128 Encryption Algorithm," Request for Comments (RFC) 2144, NetworkWorking Group, Internet Engineering Task Force, May, 1997.
-
(1997)
Request for Comments (RFC)
, vol.2144
-
-
Adams, C.M.1
-
4
-
-
85006024828
-
New Types of Cryptanalytic Attacks Using Related Keys
-
Springer-Verlag
-
E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys," Advances in Cryptology-EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.398-409, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-Eurocrypt'93, Lecture Notes in Computer Science
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
5
-
-
0026397734
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Springer-Verlag
-
E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems," Journal of Cryptology, Vol.4, No.1, pp.3-72, Springer-Verlag, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
8
-
-
84947916887
-
A known-plaintext attack of FEAL-4 based on the system of linear equations on difference (Extended Abstract)
-
Springer- Verlag
-
T. Kaneko, “A known-plaintext attack of FEAL-4 based on the system of linear equations on difference (Extended Abstract)," Advances in Cryptology- ASIACRYPT'91, Lecture Notes in Computer Science 739, pp.485-488, Springer- Verlag, 1993.
-
(1993)
Advances in Cryptology- ASIACRYPT'91, Lecture Notes in Computer Science
, vol.739
, pp. 485-488
-
-
Kaneko, T.1
-
9
-
-
0343324991
-
“A Known Plaintext Cryptanalytic Attack of FEAL-4," (In Japanese)
-
May
-
T. Kaneko, “A Known Plaintext Cryptanalytic Attack of FEAL-4," (in Japanese), IEICE Trans. Vol.76-A, No.5, May, pp.781-786, 1993.
-
(1993)
IEICE Trans
, vol.76-A
, Issue.5
, pp. 781-786
-
-
Kaneko, T.1
-
10
-
-
84947901536
-
A New Design Concept for Building Secure Block Ciphers
-
CTU Publishing House
-
K. Kiefer, “A New Design Concept for Building Secure Block Ciphers," In Proceedings of PRAGOCRYPT'96, pp.30-41, CTU Publishing House, 1996.
-
(1996)
Proceedings of PRAGOCRYPT'96
, pp. 30-41
-
-
Kiefer, K.1
-
12
-
-
0041863249
-
Higher Order Derivatives and Differential Cryptanalysis
-
Kluwer Academic Publishers
-
X. Lai, “Higher Order Derivatives and Differential Cryptanalysis," Communications and Cryptography, pp.227-233, Kluwer Academic Publishers, 1994.
-
(1994)
Communications and Cryptography
, pp. 227-233
-
-
Lai, X.1
-
13
-
-
0000949759
-
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
-
Nov, Kluwer Academic Publishers
-
J. Lee, H.M. Heys, S.E. Tavares, “Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.267-282, Kluwer Academic Publishers, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.3
, pp. 267-282
-
-
Lee, J.1
Heys, H.M.2
Tavares, S.E.3
-
14
-
-
0029632010
-
Provable Security Against a Differential Attack
-
Springer-Verlag
-
K. Nyberg and L.R. Knudsen, “Provable Security Against a Differential Attack," Journal of Cryptology, Vol.8, No.1, pp.27-37, Springer-Verlag, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.R.2
-
15
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Springer-Verlag
-
M. Matsui, “Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology-EUROCRYPT'93, Lecture Notes in Computer Science 765, pp.386-397, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-Eurocrypt'93, Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
16
-
-
1842789567
-
On Weaknesses of Non-surjective Round Functions
-
Nov, Kluwer Academic Publishers
-
V. Rijmen, B. Preneel, and E. De Win “On Weaknesses of Non-surjective Round Functions," Designs, Codes and Cryptography, Vol.12, No.3, Nov., pp.253-266, Kluwer Academic Publishers, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.3
, pp. 253-266
-
-
Rijmen, V.1
Preneel, B.2
De Win, E.3
-
17
-
-
84953635000
-
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)
-
Springer-Verlag
-
B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," Fast Software Encryption-Cambridge Security Workshop, Lecture Note in Computer Science 809, pp.191-204, Springer-Verlag, 1994.
-
(1994)
Fast Software Encryption-Cambridge Security Workshop, Lecture Note in Computer Science
, vol.809
, pp. 191-204
-
-
Schneier, B.1
-
18
-
-
33746634753
-
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher
-
(to appear in Lecture Notes in Computer Science, Springer-Verlag)
-
T. Shimoyama, S. Moriai, and T. Kaneko, “Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher," In Pre-Proceedings of 1997 Information SecurityWorkshop, pp.1-8, 1997. (to appear in Lecture Notes in Computer Science, Springer-Verlag)
-
(1997)
Pre-Proceedings of 1997 Information Securityworkshop
, pp. 1-8
-
-
Shimoyama, T.1
Moriai, S.2
Kaneko, T.3
-
19
-
-
38049042096
-
Improved Fast Software Implementation of Block Ciphers (Extended Abstract)
-
Beijing, Nov. 1997, Lecture Notes in Computer Science 1334, Springer-Verlag
-
T. Shimoyama, S. Amada, and S. Moriai, “Improved Fast Software Implementation of Block Ciphers (Extended Abstract)," ICICS'97, Beijing, Nov. 1997, Lecture Notes in Computer Science 1334, pp.269-273, Springer-Verlag, 1997.
-
(1997)
ICICS'97
, pp. 269-273
-
-
Shimoyama, T.1
Amada, S.2
Moriai, S.3
|