-
1
-
-
85028757148
-
Improving resistance to differential cryptanalysis and the redesign of LOKI
-
H. Imai and R.L. Rivest, and T. Matsumoto, editors, Lecture Notes in Computer Science 453, Springer-Verlag
-
L. Brown and M. Kwan and J. Pieprzyk and J. Seberry. Improving resistance to differential cryptanalysis and the redesign of LOKI. In H. Imai and R.L. Rivest, and T. Matsumoto, editors,Advances in Cryptology-AsiaCrypt'91, Lecture Notes in Computer Science 453, Springer-Verlag (1993), 36-50.
-
(1993)
Advances in Cryptology-AsiaCrypt'91
, pp. 36-50
-
-
Brown, L.1
Kwan, M.2
Pieprzyk, J.3
Seberry, J.4
-
2
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel. Cryptography and computer privacy.Scientific American, 228(5): 15-23, 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
3
-
-
84957664477
-
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma
-
L.C. Guillou and J.J. Quisquater, editors, Lecture Notes in Computer Science 921, Springer-Verlag
-
C. Harpes and G.G. Kramer and J.L. Massey. A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma. In L.C. Guillou and J.J. Quisquater, editors,Advances in Cryptology - Eurocrypt '95, Lecture Notes in Computer Science 921, Springer-Verlag (1995), 24-38.
-
(1995)
Advances in Cryptology - Eurocrypt '95
, pp. 24-38
-
-
Harpes, C.1
Kramer, G.G.2
Massey, J.L.3
-
4
-
-
84996804416
-
Linear cryptanalysis using multiple approximations
-
Y.G. Desmedt, editor, Lecture Notes in Computer Science 839, Springer-Verlag
-
B.S. Kaliski and M.J.B. Robshaw. Linear cryptanalysis using multiple approximations. In Y.G. Desmedt, editor,Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science 839, Springer-Verlag (1994), 26-39.
-
(1994)
Advances in Cryptology-Crypto'94
, pp. 26-39
-
-
Kaliski, B.S.1
Robshaw, M.J.B.2
-
5
-
-
84948960924
-
Linear cryptanalysis using multiple approximations and FEAL
-
B. Preneel, editor, Lecture Notes in Computer Science 1008, Springer Verlag
-
B.S. Kaliski and M..T.B. Robshaw. Linear cryptanalysis using multiple approximations and FEAL. In B. Preneel, editor,Fast Software Encryption, Lecture Notes in Computer Science 1008, Springer Verlag (1995), 249-264.
-
(1995)
Fast Software Encryption
, pp. 249-264
-
-
Kaliski, B.S.1
Robshaw, M.T.B.2
-
6
-
-
1642575733
-
Differential-linear cryptanalysis
-
Y.G. Desmedt, editor, Lecture Notes in Computer Science 839, Springer Verlag
-
S.K. Langford and M.E. Heilman. Differential-linear cryptanalysis. In Y.G. Desmedt, editor,Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science 839, Springer Verlag (1994), 17-25.
-
(1994)
Advances in Cryptology-Crypto'94
, pp. 17-25
-
-
Langford, S.K.1
Heilman, M.E.2
-
7
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
T. Helleseth, editor, Lecture Notes in Computer Science 765, Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor,Advances in Cryptology-Eurocrypt'93, Lecture Notes in Computer Science 765, Springer-Verlag (1994), 386 -397.
-
(1994)
Advances in Cryptology-Eurocrypt'93
, pp. 386-397
-
-
Matsui, M.1
-
8
-
-
85028754650
-
The first experimental cryptanalysis of the Data Encryption Standard
-
Y.G. Desmedt, editor, Lecture Notes in Computer Science 839, Springer-Verlag
-
M. Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Y.G. Desmedt, editor,Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science 839, Springer-Verlag (1994), 1-11.
-
(1994)
Advances in Cryptology-Crypto'94
, pp. 1-11
-
-
Matsui, M.1
-
10
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
T. Helleseth, editor, Lecture Notes in Computer Science 765, Springer-Verlag
-
K. Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth, editor,Advances in Cryptology-Eurocrypt'93, Lecture Notes in Computer Science 765, Springer-Verlag (1994), 55-64.
-
(1994)
Advances in Cryptology-Eurocrypt'93
, pp. 55-64
-
-
Nyberg, K.1
-
11
-
-
84948991282
-
Linear approximation of block ciphers
-
A. De Santis, editor, Lecture Notes in Computer Science 950, Springer-Verlag
-
K. Nyberg. Linear approximation of block ciphers. In A. De Santis, editor,Advances in Cryptology-Eurocrypt'94, Lecture Notes in Computer Science 950, Springer-Verlag (1995), 439-444.
-
(1995)
Advances in Cryptology-Eurocrypt'94
, pp. 439-444
-
-
Nyberg, K.1
-
12
-
-
0029632010
-
Provable security against a differential attack
-
K. Nyberg and L.R. Knudsen. Provable security against a differential attack.The Journal of Cryptology, 8(l):27-38, 1995.
-
(1995)
The Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-38
-
-
Nyberg, K.1
Knudsen, L.R.2
-
13
-
-
84948952477
-
Properties of linear approximation tables
-
B. Preneel, editor, Lecture Notes in Computer Science 1008, Springer Verlag
-
L. O'Connor. Properties of linear approximation tables. In B. Preneel, editor,Fast Software Encryption, Lecture Notes in Computer Science 1008, Springer Verlag (1995), 131-136.
-
(1995)
Fast Software Encryption
, pp. 131-136
-
-
O'Connor, L.1
-
14
-
-
85028765045
-
Linear cryptanalysis of the Fast Data Encipherment Algorithm
-
Y. Desmedt, editor, Lecture Notes in Computer Science 839, Springer-Verlag
-
K. Ohta and K. Aoki. Linear cryptanalysis of the Fast Data Encipherment Algorithm. In Y. Desmedt, editor,Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science 839, Springer-Verlag (1994) 12-16.
-
(1994)
Advances in Cryptology-Crypto'94
, pp. 12-16
-
-
Ohta, K.1
Aoki, K.2
-
15
-
-
0020928825
-
Cryptanalysis of the Data Encryption Standard by a method of formal coding
-
T. Beth, editor, Springer-Verlag
-
I. Schaumüller-Bichl. Cryptanalysis of the Data Encryption Standard by a method of formal coding. In T. Beth, editor,Cryptography, Proc. Burg Feuerstein 1982, Springer-Verlag (1983), 235-255.
-
(1983)
Cryptography, Proc. Burg Feuerstein 1982
, pp. 235-255
-
-
Schaumüller-Bichl, I.1
-
16
-
-
84955602401
-
2DES
-
J. Pieprzyk and R. Safavi-Naini, editors, Lecture Notes in Computer Science 917, Springer-Verlag
-
2DES. In J. Pieprzyk and R. Safavi-Naini, editors,Advances in Cryptology-Asiacrypt'94, Lecture Notes in Computer Science 917, Springer-Verlag (1995), 293-303.
-
(1995)
Advances in Cryptology-Asiacrypt'94
, pp. 293-303
-
-
Tokita, T.1
Sorimachi, T.2
Matsui, M.3
|