-
1
-
-
0003508574
-
Differential Cryptanalysis of the Data Encryption Standard
-
and
-
E.Biham and A.Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993. 62
-
(1993)
Springer-Verlag
, pp. 62
-
-
Biham, E.1
Shamir, A.2
-
2
-
-
0022058551
-
Covering Radius — Survey and Recent Results
-
G.D.Cohen, M.G.Karpovsky, H.F.Mattson,Jr. and J.R.Schatz. Covering Radius — Survey and Recent Results. In IEEE Transactions on Information Theory, volume 31, Number 3, pages 328–343, 1985. 69
-
(1985)
In IEEE Transactions on Information Theory, Volume
, vol.31
, Issue.3
, pp. 328-343
-
-
Cohen, G.D.1
Karpovsky, M.G.2
Mattson, H.F.3
Schatz, J.R.4
-
3
-
-
84957694404
-
Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree.In
-
T.Jakobsen. Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree. In Advances in Cryptology — CRYPTO’ 98 Proceedings, volume 1462 of Lecture Notes in Computer Science, pages 212–222, Springer-Verlag, 1998. 62
-
(1998)
Advances in Cryptology — CRYPTO’ 98 Proceedings
, vol.1462
, pp. 212-222
-
-
Jakobsen, T.1
-
4
-
-
84947929289
-
The interpolation attack on block ciphers. In
-
and, Springer-Verlag
-
T.Jakobsen and L.R.Knudsen. The interpolation attack on block ciphers. In Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 28–40, Springer-Verlag, January 1997. 62, 64, 68
-
(1997)
Fast Software Encryption
, vol.1267
, Issue.64
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
5
-
-
0041863249
-
Higher order derivatives and differential cryptanalysis
-
Monte-Verita, Ascona, Switzerland
-
X. Lai. Higher order derivatives and differential cryptanalysis. In Proceedings of Symposium on Communication, Coding and Cryptography, in honor of James L. Massey on the occasion of his 60’th birthday, February 10–13, 1994, Monte-Verita, Ascona, Switzerland, 1994. 64
-
(1994)
Proceedings of Symposium on Communication, Coding and Cryptography, in Honor of James L. Massey on the Occasion of His 60’th Birthday
, vol.1994
, pp. 10-13
-
-
Lai, X.1
-
6
-
-
0029632010
-
Provable security against a differential attack. In
-
K.Nyberg and L.R.Knudsen. Provable security against a differential attack. In Journal of Cryptology, volume 8, number 1, pages 27–37, Winter 1995. 68
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.R.2
-
8
-
-
85025704284
-
Linear cryptanalysis method for DES cipher.In
-
Springer-Verlag
-
M.Matsui. Linear cryptanalysis method for DES cipher. In Advances in Cryptol-ogy — EUROCRYPT’ 93 Proceedings, volume 765 of Lecture Notes in Computer Science, pages 386–397, Springer-Verlag, 1993. 64
-
(1993)
Advances in Cryptol-Ogy — EUROCRYPT’ 93 Proceedings
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
9
-
-
0018529746
-
The covering radius of the (M − 3)-rd order Reed-Muller codes and lower bounds on the (m − 4)-th order Reed-Muller codes. In
-
A.M.McLoughlin. The covering radius of the (m − 3)-rd order Reed-Muller codes and lower bounds on the (m − 4)-th order Reed-Muller codes. In SIAM Journal of Applied Mathematics, volume 37, number 2, October 1979. 71
-
(1979)
SIAM Journal of Applied Mathematics
, vol.37
, Issue.2
, pp. 71
-
-
Mc Loughlin, A.M.1
-
10
-
-
0024106741
-
Towards effective nonlinear cryptosystem design
-
and
-
J.Pieprzyk and G.Finkelstein. Towards effective nonlinear cryptosystem design. In IEE Proceedings Part E, volume 35, number 6, pages 325–335, November 1988.
-
(1988)
IEE Proceedings Part E
, vol.35
, Issue.6
, pp. 325-335
-
-
Pieprzyk, J.1
Finkelstein, G.2
|