메뉴 건너뛰기




Volumn 2012, Issue , 2001, Pages 315-323

Differential cryptanalysis of reduced rounds of gost

Author keywords

[No Author keywords available]

Indexed keywords

LYAPUNOV METHODS;

EID: 84949198848     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44983-3_23     Document Type: Conference Paper
Times cited : (29)

References (8)
  • 1
    • 84949271501 scopus 로고
    • GOST, Gosudarstvennyi Standard 28147-89, ”Cryptographic Protection for Data Processing SystemsGovernment Committee of the USSR for Standards
    • GOST, Gosudarstvennyi Standard 28147-89, ”Cryptographic Protection for Data Processing Systems”, Government Committee of the USSR for Standards, 1989
    • (1989)
  • 2
    • 84948949623 scopus 로고
    • Truncated and higher order differentials
    • Springer-Verlag
    • L. R. Knudsen, ”Truncated and higher order differentials”, FSE’94, Lecture Notes in Computer Science, pp. 196-211, Springer-Verlag, 1994
    • (1994) FSE’94, Lecture Notes in Computer Science , pp. 196-211
    • Knudsen, L.R.1
  • 5
    • 85006024828 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • Springer-Verlag
    • E. Biham, ”New Types of Cryptanalytic Attacks Using Related Keys”, Eurocrypt’93, Lecture Notes in Computer Science, pp. 398-409, Springer-Verlag, 1993
    • (1993) Eurocrypt’93, Lecture Notes in Computer Science , pp. 398-409
    • Biham, E.1
  • 6
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
    • Spring-Verlag
    • J. Kelsey, B. Shneier, D. Wagner, ”Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES”, CRYPTO’96 Proceedings, Spring-Verlag, 1996, pp. 237-251
    • (1996) CRYPTO’96 Proceedings , pp. 237-251
    • Kelsey, J.1    Shneier, B.2    Wagner, D.3
  • 8
    • 0026397734 scopus 로고
    • Differential Cryptanalysis of DES-like Cryptosystems
    • E. Biham, A. Shamir., ”Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology 1991
    • (1991) Journal of Cryptology
    • Biham, E.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.