-
2
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, J. of Cryptology, Vol.7, pp.229-246, 1994.
-
(1994)
J. of Cryptology
, vol.7
, pp. 229-246
-
-
Biham, E.1
-
3
-
-
85066348808
-
-
Second AES Conference
-
E. Biham, A. Biryukov, N. Ferguson, L. R. Knudsen, B. Schneier, A. Shamir, Cryptanalysis of Magenta, Second AES Conference, 1999.
-
(1999)
Cryptanalysis of Magenta
-
-
Biham, E.1
Biryukov, A.2
Ferguson, N.3
Knudsen, L.R.4
Schneier, B.5
Shamir, A.6
-
4
-
-
84957692171
-
From differential cryptanalysis to ciphertext-only attacks, LNCS 1462
-
Springer- Verlag
-
A. Biryukov, E. Kushilevitz, From differential cryptanalysis to ciphertext-only attacks, LNCS 1462, Advances in Cryptology—CRYPTO’98, pp.72-88, Springer- Verlag, 1998.
-
Advances in Cryptology—CRYPTO’98
, pp. 72-88
-
-
Biryukov, A.1
Kushilevitz, E.2
-
5
-
-
84947968200
-
Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors LNCS 1267
-
Springer-Verlag
-
C. Clapp, Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors, LNCS 1267, FSE’97 Proceedings, pp.273-287, Springer-Verlag, 1997.
-
FSE’97 Proceedings
, pp. 273-287
-
-
Clapp, C.1
-
6
-
-
84947920830
-
Joint Hardware / Software Design of a Fast Stream Cipher, LNCS 1373
-
Springer-Verlag
-
C. Clapp, Joint Hardware / Software Design of a Fast Stream Cipher, LNCS 1373, FSE’98 Proceedings, pp.75-92, Springer-Verlag, 1998.
-
(1998)
FSE’98 Proceedings
, pp. 75-92
-
-
Clapp, C.1
-
8
-
-
85028746172
-
Re-synchronization weaknesses in stream ciphers, LNCS 765
-
Springer-Verlag
-
J. Daemen, R. Govaerts, J. Vanderwalle, Re-synchronization weaknesses in stream ciphers, LNCS 765, Advances in Cryptology—EUROCRYPT’93, pp.159-169, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology—EUROCRYPT’93
, pp. 159-169
-
-
Daemen, J.1
Govaerts, R.2
Vanderwalle, J.3
-
10
-
-
84947917071
-
Reinventing the Travois: Encryption/MAC in 30 ROM Bytes, LNCS 1267, FSE’97 Proceedings
-
Springer-Verlag
-
G. Yuval, Reinventing the Travois: Encryption/MAC in 30 ROM Bytes, LNCS 1267, FSE’97 Proceedings, pp.205-209, Springer-Verlag, 1997.
-
(1997)
FSE’97 Proceedings
, pp. 205-209
-
-
Yuval, G.1
-
12
-
-
85066344394
-
Cryptanalysis of LOKI91, LNCS 718, Advances in Cryptology— AUSCRYPT’92
-
Springer-Verlag
-
L. R. Knudsen, Cryptanalysis of LOKI91, LNCS 718, Advances in Cryptology— AUSCRYPT’92, pp.196-208, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology— AUSCRYPT’92
, pp. 196-208
-
-
Knudsen, L.R.1
-
13
-
-
85025704284
-
Linear Cryptanalysis Method of DES Cipher, LNCS 765
-
Springer-Verlag
-
M. Matsui, Linear Cryptanalysis Method of DES Cipher, LNCS 765, Advances in Cryptology—EUROCRYPT’93, pp.386-397, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology—EUROCRYPT’93
, pp. 386-397
-
-
Matsui, M.1
-
14
-
-
84953635000
-
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), LNCS 809
-
Springer-Verlag
-
B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), LNCS 809, FSE’94 Proceedings, pp.191-204, Springer-Verlag, 1994.
-
(1994)
FSE’94 Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
15
-
-
26944454939
-
On the Weak Keys in Blowfish, LNCS 1039
-
Springer-Verlag
-
S. Vaudenay, On the Weak Keys in Blowfish, LNCS 1039, FSE’96 Proceedings, pp.27-32, Springer-Verlag, 1996.
-
(1996)
FSE’96 Proceedings
, pp. 27-32
-
-
Vaudenay, S.1
-
16
-
-
84947936199
-
Cryptanalysis of some recently-proposed multiple modes of operation, LNCS 1373
-
Springer-Verlag
-
D. Wagner, Cryptanalysis of some recently-proposed multiple modes of operation, LNCS 1373, FSE’98 Proceedings, pp.254-269, Springer-Verlag, 1998.
-
(1998)
FSE’98 Proceedings
, pp. 254-269
-
-
Wagner, D.1
|