-
1
-
-
84957694360
-
Miss in the middle attacks on IDEA and Khufu
-
In L. Knudsen, editor, Rome, Italy, Springer-Verlag
-
[1] E. Biham, A. Biryukov, and A. Shamir. Miss in the middle attacks on IDEA and Khufu. In L. Knudsen, editor, Fast Software Encryption, 6th international Workshop, volume 1636 of Lecture Notes in Computer Science, pages 124–138, Rome, Italy, 1999. Springer-Verlag.
-
(1999)
Fast Software Encryption, 6Th International Workshop, Volume 1636 of Lecture Notes in Computer Science
, pp. 124-138
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84949442430
-
-
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms – Document 2: KASUMI Specification, Version 1.0. 3G TS 35.202, December 23
-
[4] ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms – Document 2: KASUMI Specification, Version 1.0. 3G TS 35.202, December 23, 1999. http://www.etsi.org/dvbandca/3GPP/3GPPconditions.html.
-
(1999)
-
-
-
5
-
-
0037605437
-
-
Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb
-
[5] L. R. Knudsen. DEAL — A 128-bit block cipher. Technical Report 151, Department of Informatics, University of Bergen, Bergen, Norway, Feb. 1998.
-
(1998)
DEAL — a 128-Bit Block Cipher
-
-
Knudsen, L.R.1
-
7
-
-
84945134259
-
Cryptanalysis of Reduced-Round MISTY
-
Springer Verlag
-
[7] U. Kühn. Cryptanalysis of Reduced-Round MISTY. In B. Pfitzmann, editor, Advances in Cryptology – EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 325–339. Springer Verlag, 2001.
-
(2001)
B. Pfitzmann, Editor, Advances in Cryptology – EUROCRYPT 2001, Volume 2045 of Lecture Notes in Computer Science
, pp. 325-339
-
-
Kühn, U.1
-
8
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
In T. Helleseth, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume 765
-
[8] M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT’93, pages 386–397, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765.
-
(1993)
Advances in Cryptology - EUROCRYPT’93
, pp. 386-397
-
-
Matsui, M.1
-
9
-
-
84947904428
-
New block encryption algorithm MISTY
-
E. Biham, editor, Haifa, Israel, 20–22 Jan, Springer-Verlag
-
[9] M. Matsui. New block encryption algorithm MISTY. In E. Biham, editor, Fast Software Encryption: 4th International Workshop, volume 1267 of Lecture Notes in Computer Science, pages 54–68, Haifa, Israel, 20–22 Jan. 1997. Springer-Verlag.
-
(1997)
Fast Software Encryption: 4Th International Workshop, Volume 1267 of Lecture Notes in Computer Science
, pp. 54-68
-
-
Matsui, M.1
-
11
-
-
84949479486
-
-
NESSIE. New European Schemes for Signature, Integrity, and Encryption
-
NESSIE. New European Schemes for Signature, Integrity, and Encryption. http://www.cryptonessie.org.
-
-
-
-
12
-
-
84957686830
-
Strength of MISTY1 without FL function for higher order differential attack
-
In M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, Hawaii, USA, Springer Verlag
-
[12] H. Tanaka, K. Hisamatsu, and T. Kaneko. Strength of MISTY1 without FL function for higher order differential attack. In M. Fossorier, H. Imai, S. Lin, and A. Poli, editors, Proc. Applied algebra, algebraic algorithms, and error-correcting codes: 13th international symposium, AAECC-13, volume 1719 of Lecture Notes in Computer Science, pages 221–230, Hawaii, USA, 1999. Springer Verlag.
-
(1999)
Proc. Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes: 13Th International Symposium, AAECC-13, Volume 1719 of Lecture Notes in Computer Science
, pp. 221-230
-
-
Tanaka, H.1
Hisamatsu, K.2
Kaneko, T.3
|