-
1
-
-
84947914301
-
A Fast New DES Implementation in Software
-
Haifa, Israel, Lectures Notes in Computer Science 1267, Springer-Verlag
-
E. Biham. A Fast New DES Implementation in Software. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 260-272, Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption
, pp. 260-272
-
-
Biham, E.1
-
4
-
-
0001820140
-
Cryptography and Computer Privacy
-
H. Feistel. Cryptography and Computer Privacy. Scientific American, vol. 228, pp. 15-23, 1973.
-
(1973)
Scientific American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
5
-
-
84949287046
-
-
Advanced Encryption Standard Submissions, US Department of Commerce
-
H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern,. Vaudenay. Decorrelated Fast Cipher: an AES Candidate. Advanced Encryption Standard Submissions, US Department of Commerce, 1998.
-
(1998)
Vaudenay. Decorrelated Fast Cipher: An AES Candidate
-
-
Gilbert, H.1
Girault, M.2
Hoogvorst, P.3
Noilhan, F.4
Pornin, T.5
Poupard, G.6
Stern, J.7
-
6
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Functions
-
M. Luby, C. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal on Computing, vol. 17, pp. 373-386, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
7
-
-
85028754650
-
The First Experimental Cryptanalysis of the Data Encryption Standard
-
Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, Springer-Verlag
-
M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard. In Advances in Cryptology CRYPTO'94, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 839, pp. 1-11, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology CRYPTO'94
, pp. 1-11
-
-
Matsui, M.1
-
8
-
-
0001280130
-
New Structure of Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis
-
Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, Springer-Verlag, 996
-
M. Matsui. New Structure of Block Ciphers with Provable Security Against Differential and Linear Cryptanalysis. In Fast Software Encryption, Cambridge, United Kingdom, Lectures Notes in Computer Science 1039, pp. 205-218, Springer-Verlag, 996.
-
Fast Software Encryption
, pp. 205-218
-
-
Matsui, M.1
-
10
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon. Communication Theory of Secrecy Systems. Bell system technical journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell system technical journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
11
-
-
84949287047
-
How to Photofinish a Cryptosystem?
-
Presented at the
-
A. Shamir. How to Photofinish a Cryptosystem? Presented at the Rump Session of Crypto'97.
-
Rump Session of Crypto'97
-
-
Shamir, A.1
-
13
-
-
78649840429
-
Provable Security for Block Ciphers by Decorrelation
-
Paris, France, Lectures Notes in Computer Science 1373, SpringerVerlag
-
S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. In STACS 98, Paris, France, Lectures Notes in Computer Science 1373, pp. 249-275, SpringerVerlag, 1998.
-
(1998)
STACS 98
, pp. 249-275
-
-
Vaudenay, S.1
-
16
-
-
0000478763
-
Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic communications
-
G. S. Vernam. Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic communications. Journal of the American Institute of Electrical Engineers, vol. 45, pp. 109-115, 1926.
-
(1926)
Journal of the American Institute of Electrical Engineers
, vol.45
, pp. 109-115
-
-
Vernam, G.S.1
-
17
-
-
0019572642
-
New Hash Functions and their Use in Authentication and Set Equality
-
M. N. Wegman, J. L. Carter. New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|