-
3
-
-
70549111766
-
Block Ciphers Based on Modular Arithmetic
-
Rome, Italy, 15-16
-
J. Deamen, R. Govaerts, and J. Vandewalle, “Block Ciphers Based on Modular Arithmetic,” Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, Rome, Italy, 15-16 Feb 1993, pp. 80-89.
-
(1993)
Proceedings of the 3Rd Symposium on State and Progress of Research in Cryptography
, pp. 80-89
-
-
Deamen, J.1
Govaerts, R.2
Vandewalle, J.3
-
4
-
-
84977806870
-
Linear Structures in Blockciphers
-
Springer-Verlag
-
J.-H. Evertse, “Linear Structures in Blockciphers,” Advances in Cryptology—EUROCRPYT ‘87, Springer-Verlag, 1988, pp. 249-266.
-
(1988)
Advances in Cryptology—EUROCRPYT ‘87
, pp. 249-266
-
-
Evertse, J.-H.1
-
5
-
-
0001820140
-
Cryptography and Computer Privacy
-
May 73
-
H. Feistel, “Cryptography and Computer Privacy,” Scientific American, v. 228, n. 5, May 73, pp. 15-23.
-
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
6
-
-
77956044213
-
Cryptographic Protection for Data Processing Systems
-
GOST 28147-89, Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354. (in Russian)
-
GOST 28147-89, “Cryptographic Protection for Data Processing Systems,” “Cryptographic Transformation Algorithm,” Government Standard of the U.S.S.R., Inv. No. 3583, UDC 681.325.6:006.354. (in Russian)
-
Cryptographic Transformation Algorithm
-
-
-
7
-
-
85028910917
-
Markov Ciphers and Differential Cryptanalysis
-
Springer-Verlag
-
X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,” Advances in Cryptology—EUROCRYPT ‘91 Proceedings, Springer-Verlag, 1991, pp. 17-38.
-
(1991)
Advances in Cryptology—EUROCRYPT ‘91 Proceedings
, pp. 17-38
-
-
Lai, X.1
Massey, J.2
Murphy, S.3
-
9
-
-
35248843169
-
-
U.S. Patent 5,214,703, 25
-
J.L. Massey and X. Lai, “Device for the Conversion of a Digital Block and Use of Same,” U.S. Patent 5,214,703, 25 May 1993.
-
(1993)
Device for the Conversion of a Digital Block and Use of Same
-
-
Massey, J.L.1
Lai, X.2
-
10
-
-
0000392205
-
Linear Cryptanalysis Method for DES Cipher
-
Springer-Verlag, in preparation
-
M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology—CRYPTO ‘93 Proceedings, Springer-Verlag, 1994, in preparation.
-
(1994)
Advances in Cryptology—CRYPTO ‘93 Proceedings
-
-
Matsui, M.1
-
13
-
-
33751573049
-
The FEAL-8 Cryptosystem and Call for Attack
-
Springer-Verlag
-
S. Miyaguchi, “The FEAL-8 Cryptosystem and Call for Attack,” Advances in Cryptology—CRYPTO ‘89 Proceedings, Springer-Verlag, 1990, pp. 624-627.
-
(1990)
Advances in Cryptology—CRYPTO ‘89 Proceedings
, pp. 624-627
-
-
Miyaguchi, S.1
-
14
-
-
0343325615
-
Expansion of the FEAL Cipher
-
S. Miyaguchi, “Expansion of the FEAL Cipher,” NTT Review, v. 2, n. 6, Nov 1990.
-
(1990)
NTT Review
, vol.2
, Issue.6
-
-
Miyaguchi, S.1
-
16
-
-
0003508568
-
-
National Bureau of Standards, U.S. Department of Commerce, FIPS Publication 46
-
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS Publication 46, Jan 1977.
-
(1977)
Data Encryption Standard
-
-
-
17
-
-
77956015959
-
-
National Institute of Standards and Technology, 30 Apr
-
National Institute of Standards and Technology, “Clipper Chip Technology”, 30 Apr 1993.
-
(1993)
Clipper Chip Technology
-
-
-
19
-
-
84900167008
-
Data Guardians
-
Feb
-
B. Schneier, “Data Guardians,” MacWorld, Feb 1993, 145-151.
-
(1993)
Macworld
, pp. 145-151
-
-
Schneier, B.1
|