메뉴 건너뛰기




Volumn 1556, Issue , 1999, Pages 1-14

Feistel ciphers with L2-decorrelation

Author keywords

[No Author keywords available]

Indexed keywords

LYAPUNOV METHODS; SECURITY OF DATA;

EID: 84949235395     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48892-8_1     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 1
    • 84947914301 scopus 로고    scopus 로고
    • A Fast New DES Implementation in Software
    • Haifa, Israel, Lectures Notes in Computer Science 1267, Springer-Verlag
    • E. Biham. A Fast New DES Implementation in Software. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 260-272, Springer-Verlag, 1997.
    • (1997) Fast Software Encryption , pp. 260-272
    • Biham, E.1
  • 4
    • 0001820140 scopus 로고
    • Cryptography and Computer Privacy
    • H. Feistel. Cryptography and Computer Privacy. Scientific American, vol. 228, pp. 15-23, 1973.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 6
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations from Pseudorandom Functions
    • M. Luby, C. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal on Computing, vol. 17, pp. 373-386, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 7
    • 85028754650 scopus 로고
    • The First Experimental Cryptanalysis of the Data Encryption Standard
    • Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, Springer-Verlag
    • M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In Advances in Cryptology CRYPTO'94, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, pp. 1-11, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology CRYPTO'94 , pp. 1-11
    • Matsui, M.1
  • 8
    • 0001280130 scopus 로고    scopus 로고
    • New Structure of Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis
    • Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, Springer-Verlag, 996
    • M. Matsui. New Structure of Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, pp. 205-218, Springer-Verlag, 996.
    • Fast Software Encryption , pp. 205-218
    • Matsui, M.1
  • 10
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon. Communication Theory of Secrecy Systems. Bell system technical journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell system technical journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 11
    • 84949287047 scopus 로고    scopus 로고
    • How to Photofinish a Cryptosystem?
    • Presented at the
    • A. Shamir. How to Photofinish a Cryptosystem? Presented at the Rump Session of Crypto'97.
    • Rump Session of Crypto'97
    • Shamir, A.1
  • 13
    • 78649840429 scopus 로고    scopus 로고
    • Provable Security for Block Ciphers by Decorrelation
    • Paris, France, Lectures Notes in Computer Science 1373, SpringerVerlag
    • S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. In STACS 98, Paris, France, Lectures Notes in Computer Science 1373, pp. 249-275, SpringerVerlag, 1998.
    • (1998) STACS 98 , pp. 249-275
    • Vaudenay, S.1
  • 16
    • 0000478763 scopus 로고
    • Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic communications
    • G. S. Vernam. Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic communications. Journal of the American Institute of Electrical Engineers, vol. 45, pp. 109-115, 1926.
    • (1926) Journal of the American Institute of Electrical Engineers , vol.45 , pp. 109-115
    • Vernam, G.S.1
  • 17
    • 0019572642 scopus 로고
    • New Hash Functions and their Use in Authentication and Set Equality
    • M. N. Wegman, J. L. Carter. New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.