메뉴 건너뛰기




Volumn 1592, Issue , 1999, Pages 255-271

Resistance against general iterated attacks

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 84957641836     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48910-X_18     Document Type: Conference Paper
Times cited : (13)

References (25)
  • 1
    • 84957701487 scopus 로고
    • Federal Information Processing Standard Publication 46
    • Data Encryption Standard. Federal Information Processing Standard Publication 46, U. S. National Bureau of Standards, 1977.
    • (1977) U. S. National Bureau of Standards
  • 2
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • Fairfax, Virginia, U.S.A, ACM Press
    • M. Bellare, P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, U.S.A., pp. 62-73, ACM Press, 1993.
    • (1993) 1St ACM Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1
    • Santa Barbara, California, U.S.A., Lectures Notes in Computer Science, Springer-Verlag
    • D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In Advances in Cryptology CRYPTO'98, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 1462, pp. 1-12, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology CRYPTO'98 , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 6
    • 0001820140 scopus 로고
    • Cryptography and Computer Privacy
    • H. Feistel. Cryptography and Computer Privacy. Scientiffic American, vol. 228, pp. 15-23, 1973.
    • (1973) Scientiffic American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 7
    • 84949262473 scopus 로고    scopus 로고
    • Decorrelated Fast Cipher: An AES Candidate. Submitted to the Advanced Encryption Standard process
    • National Institute of Standards and Technology (NIST), August
    • H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay. Decorrelated Fast Cipher: An AES Candidate. Submitted to the Advanced Encryption Standard process. In CD-ROM “AES CD-1: Documentation",National Institute of Standards and Technology (NIST), August 1998.
    • (1998) CD-ROM “AES CD-1: Documentation
    • Gilbert, H.1    Girault, M.2    Hoogvorst, P.3    Noilhan, F.4    Pornin, T.5    Poupard, G.6    Stern, J.7    Vaudenay, S.8
  • 9
    • 84942522751 scopus 로고    scopus 로고
    • MMH: Software Message Authentication in the Gbit/Second Rates
    • Haifa, Israel, Lectures Notes in Computer Science, Springer-Verlag
    • S. Halevi, H. Krawczyk. MMH: Software Message Authentication in the Gbit/Second Rates. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 172-189, Springer-Verlag, 1997.
    • (1997) Fast Software Encryption , vol.1267 , pp. 172-189
    • Halevi, S.1    Krawczyk, H.2
  • 10
    • 84947929289 scopus 로고    scopus 로고
    • The Interpolation Attack on Block Ciphers
    • Haifa, Israel, Lectures Notes in Computer Science, Springer-Verlag
    • T. Jakobsen, L. R. Knudsen. The Interpolation Attack on Block Ciphers. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 28-40, Springer-Verlag, 1997.
    • (1997) Fast Software Encryption , vol.1267 , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 11
    • 85028843848 scopus 로고
    • How to Construct Pseudorandom Permutations from a Single Pseudorandom Functions
    • Aarhus, Denemark, Lectures Notes in Computer Science, Springer-Verlag
    • J. Pieprzyk. How to Construct Pseudorandom Permutations from a Single Pseudorandom Functions. In Advances in Cryptology EUROCRYPT'90, Aarhus, Denemark, Lectures Notes in Computer Science 473, pp. 140-150, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology EUROCRYPT'90 , vol.473 , pp. 140-150
    • Pieprzyk, J.1
  • 12
    • 84957650223 scopus 로고
    • Etude des Générateurs de Permutations Basés sur le Schéma du D.E.S
    • J. Patarin. Etude des Générateurs de Permutations Basés sur le Schéma du D.E.S., Thése de Doctorat de l'Universitéde Paris 6, 1991.
    • (1991) Thése De Doctorat De l'Universitéde Paris , vol.6
    • Patarin, J.1
  • 13
    • 85034496745 scopus 로고
    • How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function
    • Hungary, Lectures Notes in Computer Science, Springer-Verlag
    • J. Patarin. How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function. In Advances in Cryptology EURO- CRYPT'92, Balatonfred, Hungary, Lectures Notes in Computer Science 658, pp. 256-266, Springer-Verlag, 1993.
    • (1993) Advances in Cryptology EURO- CRYPT'92, Balatonf , vol.658 , pp. 256-266
    • Patarin, J.1
  • 14
    • 84947932235 scopus 로고    scopus 로고
    • About Feistel Schemes with Six (Or More) Rounds
    • Paris, France, Lectures Notes in Computer Science, Springer-Verlag
    • J. Patarin. About Feistel Schemes with Six (or More) Rounds. In Fast Software Encryption, Paris, France, Lectures Notes in Computer Science 1372, pp. 103-121, Springer-Verlag, 1998.
    • (1998) Fast Software Encryption , vol.1372 , pp. 103-121
    • Patarin, J.1
  • 15
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-key Cryptosystem
    • R. L. Rivest, A. Shamir and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystem. In Communications of the ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 16
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • C. E. Shannon. Communication Theory of Secrecy Systems. Bell system technical journal, vol. 28, pp. 656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 17
    • 84942550160 scopus 로고    scopus 로고
    • Lower Bounds for Discrete Logarithms and Related Problems
    • Konstanz, Germany, Lectures Notes in Computer Science, Springer-Verlag
    • V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In Ad- vances in Cryptology EUROCRYPT'97, Konstanz, Germany, Lectures Notes in Computer Science 1233, pp. 256-266, Springer-Verlag, 1997.
    • (1997) Ad- Vances in Cryptology EUROCRYPT'97 , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 18
  • 19
    • 78649840429 scopus 로고    scopus 로고
    • Provable Security for Block Ciphers by Decorrelation
    • Paris, France, Lectures Notes in Computer Science, Springer- Verlag
    • S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. In STACS 98, Paris, France, Lectures Notes in Computer Science 1373, pp. 249-275, Springer- Verlag, 1998.
    • (1998) STACS 98 , vol.1373 , pp. 249-275
    • Vaudenay, S.1
  • 20
    • 84957626533 scopus 로고    scopus 로고
    • Provable Security for Block Ciphers by Decorrelation
    • Preliminary version available on
    • S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. (Full Paper.) Submitted. Preliminary version available on URL:ftp://ftp.ens.fr/pub/reports/liens/liens-98-8.A4.ps.Z
    • Submitted
    • Vaudenay, S.1
  • 21
    • 84957630473 scopus 로고    scopus 로고
    • Feistel Ciphers with L2-Decorrelation
    • S. Vaudenay. Feistel Ciphers with L2-Decorrelation. To appear in SAC'98, LNCS.
    • To Appear in SAC'98
    • Vaudenay, S.1
  • 23
    • 0000478763 scopus 로고
    • Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications
    • G. S. Vernam. Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Journal of the American Institute of Electrical Engi- neers, vol. 45, pp. 109-115, 1926.
    • (1926) Journal of the American Institute of Electrical Engi- Neers , vol.45 , pp. 109-115
    • Vernam, G.S.1
  • 25
    • 0019572642 scopus 로고
    • New Hash Functions and their Use in Authentication and Set Equality
    • M. N. Wegman, J. L. Carter. New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.