-
1
-
-
84957701487
-
Federal Information Processing Standard Publication 46
-
Data Encryption Standard. Federal Information Processing Standard Publication 46, U. S. National Bureau of Standards, 1977.
-
(1977)
U. S. National Bureau of Standards
-
-
-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
Fairfax, Virginia, U.S.A, ACM Press
-
M. Bellare, P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, U.S.A., pp. 62-73, ACM Press, 1993.
-
(1993)
1St ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84957693225
-
Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1
-
Santa Barbara, California, U.S.A., Lectures Notes in Computer Science, Springer-Verlag
-
D. Bleichenbacher. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In Advances in Cryptology CRYPTO'98, Santa Barbara, California, U.S.A., Lectures Notes in Computer Science 1462, pp. 1-12, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology CRYPTO'98
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
6
-
-
0001820140
-
Cryptography and Computer Privacy
-
H. Feistel. Cryptography and Computer Privacy. Scientiffic American, vol. 228, pp. 15-23, 1973.
-
(1973)
Scientiffic American
, vol.228
, pp. 15-23
-
-
Feistel, H.1
-
7
-
-
84949262473
-
Decorrelated Fast Cipher: An AES Candidate. Submitted to the Advanced Encryption Standard process
-
National Institute of Standards and Technology (NIST), August
-
H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay. Decorrelated Fast Cipher: An AES Candidate. Submitted to the Advanced Encryption Standard process. In CD-ROM “AES CD-1: Documentation",National Institute of Standards and Technology (NIST), August 1998.
-
(1998)
CD-ROM “AES CD-1: Documentation
-
-
Gilbert, H.1
Girault, M.2
Hoogvorst, P.3
Noilhan, F.4
Pornin, T.5
Poupard, G.6
Stern, J.7
Vaudenay, S.8
-
8
-
-
0021567758
-
How to Construct Random Functions
-
Singer Island, U.S.A, IEEE
-
O. Goldreich, S. Goldwasser, S. Micali. How to Construct Random Functions. In Proceedings of the 25th IEEE Symposium on Foundations of Computer Science, Singer Island, U.S.A., pp. 464-479, IEEE, 1984.
-
(1984)
Proceedings of the 25Th IEEE Symposium on Foundations of Computer Science
, pp. 464-479
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
9
-
-
84942522751
-
MMH: Software Message Authentication in the Gbit/Second Rates
-
Haifa, Israel, Lectures Notes in Computer Science, Springer-Verlag
-
S. Halevi, H. Krawczyk. MMH: Software Message Authentication in the Gbit/Second Rates. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 172-189, Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
10
-
-
84947929289
-
The Interpolation Attack on Block Ciphers
-
Haifa, Israel, Lectures Notes in Computer Science, Springer-Verlag
-
T. Jakobsen, L. R. Knudsen. The Interpolation Attack on Block Ciphers. In Fast Software Encryption, Haifa, Israel, Lectures Notes in Computer Science 1267, pp. 28-40, Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
11
-
-
85028843848
-
How to Construct Pseudorandom Permutations from a Single Pseudorandom Functions
-
Aarhus, Denemark, Lectures Notes in Computer Science, Springer-Verlag
-
J. Pieprzyk. How to Construct Pseudorandom Permutations from a Single Pseudorandom Functions. In Advances in Cryptology EUROCRYPT'90, Aarhus, Denemark, Lectures Notes in Computer Science 473, pp. 140-150, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology EUROCRYPT'90
, vol.473
, pp. 140-150
-
-
Pieprzyk, J.1
-
12
-
-
84957650223
-
Etude des Générateurs de Permutations Basés sur le Schéma du D.E.S
-
J. Patarin. Etude des Générateurs de Permutations Basés sur le Schéma du D.E.S., Thése de Doctorat de l'Universitéde Paris 6, 1991.
-
(1991)
Thése De Doctorat De l'Universitéde Paris
, vol.6
-
-
Patarin, J.1
-
13
-
-
85034496745
-
How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function
-
Hungary, Lectures Notes in Computer Science, Springer-Verlag
-
J. Patarin. How to Construct Pseudorandom and Super Pseudorandom Permutations from One Single Pseudorandom Function. In Advances in Cryptology EURO- CRYPT'92, Balatonfred, Hungary, Lectures Notes in Computer Science 658, pp. 256-266, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology EURO- CRYPT'92, Balatonf
, vol.658
, pp. 256-266
-
-
Patarin, J.1
-
14
-
-
84947932235
-
About Feistel Schemes with Six (Or More) Rounds
-
Paris, France, Lectures Notes in Computer Science, Springer-Verlag
-
J. Patarin. About Feistel Schemes with Six (or More) Rounds. In Fast Software Encryption, Paris, France, Lectures Notes in Computer Science 1372, pp. 103-121, Springer-Verlag, 1998.
-
(1998)
Fast Software Encryption
, vol.1372
, pp. 103-121
-
-
Patarin, J.1
-
15
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystem
-
R. L. Rivest, A. Shamir and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystem. In Communications of the ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
16
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon. Communication Theory of Secrecy Systems. Bell system technical journal, vol. 28, pp. 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
17
-
-
84942550160
-
Lower Bounds for Discrete Logarithms and Related Problems
-
Konstanz, Germany, Lectures Notes in Computer Science, Springer-Verlag
-
V. Shoup. Lower Bounds for Discrete Logarithms and Related Problems. In Ad- vances in Cryptology EUROCRYPT'97, Konstanz, Germany, Lectures Notes in Computer Science 1233, pp. 256-266, Springer-Verlag, 1997.
-
(1997)
Ad- Vances in Cryptology EUROCRYPT'97
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
18
-
-
0029698589
-
An Experiment on DES - Statistical Cryptanalysis
-
New Delhi, India, ACM Press
-
S. Vaudenay. An Experiment on DES - Statistical Cryptanalysis. In 3rd ACM Conference on Computer and Communications Security, New Delhi, India, pp. 139-147, ACM Press, 1996.
-
(1996)
3Rd ACM Conference on Computer and Communications Security
, pp. 139-147
-
-
Vaudenay, S.1
-
19
-
-
78649840429
-
Provable Security for Block Ciphers by Decorrelation
-
Paris, France, Lectures Notes in Computer Science, Springer- Verlag
-
S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. In STACS 98, Paris, France, Lectures Notes in Computer Science 1373, pp. 249-275, Springer- Verlag, 1998.
-
(1998)
STACS 98
, vol.1373
, pp. 249-275
-
-
Vaudenay, S.1
-
20
-
-
84957626533
-
Provable Security for Block Ciphers by Decorrelation
-
Preliminary version available on
-
S. Vaudenay. Provable Security for Block Ciphers by Decorrelation. (Full Paper.) Submitted. Preliminary version available on URL:ftp://ftp.ens.fr/pub/reports/liens/liens-98-8.A4.ps.Z
-
Submitted
-
-
Vaudenay, S.1
-
21
-
-
84957630473
-
Feistel Ciphers with L2-Decorrelation
-
S. Vaudenay. Feistel Ciphers with L2-Decorrelation. To appear in SAC'98, LNCS.
-
To Appear in SAC'98
-
-
Vaudenay, S.1
-
23
-
-
0000478763
-
Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications
-
G. S. Vernam. Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Journal of the American Institute of Electrical Engi- neers, vol. 45, pp. 109-115, 1926.
-
(1926)
Journal of the American Institute of Electrical Engi- Neers
, vol.45
, pp. 109-115
-
-
Vernam, G.S.1
-
25
-
-
0019572642
-
New Hash Functions and their Use in Authentication and Set Equality
-
M. N. Wegman, J. L. Carter. New Hash Functions and their Use in Authentication and Set Equality. Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|