-
1
-
-
35248815213
-
-
June 25, Available at
-
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson, A. Shamir. Initial Observations on the Skipjack Encryption Algorithm. June 25, 1998. Available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
-
(1998)
Initial Observations on the Skipjack Encryption Algorithm
-
-
Biham, E.1
Biryukov, A.2
Dunkelmann, O.3
Richardson, E.4
Shamir, A.5
-
2
-
-
84949478706
-
-
July 2, Available at
-
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson, and A. Shamir. Cryptanalysis of Skipjack-3XOR in 220 time and using 29 chosen plaintexts. July 2, 1998. Available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
-
(1998)
Cryptanalysis of Skipjack-3Xor in 2 Time and Using 2 Chosen Plaintexts
-
-
Biham, E.1
Biryukov, A.2
Dunkelmann, O.3
Richardson, E.4
Shamir, A.5
-
3
-
-
84949482021
-
-
June 30, Available at
-
E. Biham, A. Biryukov, O. Dunkelmann, E. Richardson, and A. Shamir. Cryptanalysis of Skipjack-4XOR. June 30, 1998. Available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
-
(1998)
Cryptanalysis of Skipjack-4Xor
-
-
Biham, E.1
Biryukov, A.2
Dunkelmann, O.3
Richardson, E.4
Shamir, A.5
-
4
-
-
84957106899
-
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR
-
Available at
-
E. Biham, A. Biryukov, and A. Shamir. Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. SAC'98. Available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
-
SAC'98
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
84957634424
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
J. Stern, editor, Springer Verlag, Also available at
-
E. Biham, A. Biryukov, and A. Shamir. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In J. Stern, editor, Advances in Cryptology - Eurocrypt '99, volume 1592 of Lecture Notes in Computer Science, pages 12-23, 1999. Springer Verlag. Also available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
-
(1999)
Advances in Cryptology - Eurocrypt '99, Volume 1592 of Lecture Notes in Computer Science
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
7
-
-
84957085896
-
Applications of higher order di_erentials and partial difierentials
-
B. Preneel, editor, Springer Verlag
-
L.R. Knudsen. Applications of higher order di_erentials and partial difierentials. In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 196-211, 1995. Springer Verlag.
-
(1995)
Fast Software Encryption, Volume 1008 of Lecture Notes in Computer Science
, pp. 196-211
-
-
Knudsen, L.R.1
-
8
-
-
84947941735
-
On the design and security of RC2
-
S. Vaudenay, editor, Springer Verlag
-
L.R. Knudsen, V. Rijmen, R.L. Rivest, and M.J.B. Robshaw. On the design and security of RC2. In S. Vaudenay, editor, Fast Software Encryption, volume 1372 of Lecture Notes in Computer Science, pages 206-219, 1998. Springer Verlag.
-
(1998)
Fast Software Encryption, Volume 1372 of Lecture Notes in Computer Science
, pp. 206-219
-
-
Knudsen, L.R.1
Rijmen, V.2
Rivest, R.L.3
Robshaw, M.4
-
9
-
-
84875634542
-
-
July 28
-
E.F. Brickell, D.E. Denning, S.T. Kent, D.P. Maher, and W. Tuchman. Skipjack Review Interim Report. July 28, 1993.
-
(1993)
Skipjack Review Interim Report
-
-
Brickell, E.F.1
Denning, D.E.2
Kent, S.T.3
Maher, D.P.4
Tuchman, W.5
-
10
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
T. Helleseth, editor, Springer Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology - Eurocrypt '93, volume 765 of Lecture Notes in Computer Science, pages 386-397, 1993. Springer Verlag.
-
(1993)
Advances in Cryptology - Eurocrypt '93, Volume 765 of Lecture Notes in Computer Science
, pp. 386-397
-
-
Matsui, M.1
-
15
-
-
0347124644
-
-
Available at
-
National Security Agency. Skipjack and KEA algorithm specifications. May 1998. Available at http://csrc.ncsl.nist.gov/encryption/skipjack-1.pdf.
-
(1998)
Skipjack and KEA Algorithm Specifications
-
-
-
16
-
-
35248882184
-
-
Press Release, June 24, Available at
-
National Security Agency. NSA Releases Fortezza Algorithms, Press Release, June 24, 1998. Available at http://csrc.ncsl.nist.gov/encryption/nsa-press.pdf.
-
(1998)
NSA Releases Fortezza Algorithms
-
-
-
17
-
-
84945126868
-
The boomerang attack
-
L. Knudsen, editor, Springer Verlag
-
D. Wagner. The boomerang attack. In L. Knudsen, editor, Fast Software Encryption, volume 1636 of Lecture Notes in Computer Science, pages 156-170, 1999. Springer Verlag.
-
(1999)
Fast Software Encryption, Volume 1636 of Lecture Notes in Computer Science
, pp. 156-170
-
-
Wagner, D.1
|