-
2
-
-
0037661663
-
A Fast New DES Implementation in Software
-
LNCS 1267, [Bih97]
-
[Bih97] E. Biham., "A Fast New DES Implementation in Software," FSE'97, LNCS 1267, pp. 245-251, (1997).
-
(1997)
FSE'97
, pp. 245-251
-
-
Biham, E.1
-
3
-
-
84919912147
-
Report of the workshop on cryptography in support of computer security
-
Sept, 21-22 1976, NBSIR 77-1291, Sept. [Bra77]
-
[Bra77] D. Branstead, J. Gait, S. Katzke., "Report of the workshop on cryptography in support of computer security," National Bureau of Standards, Sept, 21-22 1976, NBSIR 77-1291, Sept. (1977).
-
(1977)
National Bureau of Standards
-
-
Branstead, D.1
Gait, J.2
Katzke, S.3
-
4
-
-
1542434691
-
Analytical charactersitics of the DES
-
[Dav83]
-
[Dav83] M. Davio, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbosch, P. Neutjens, P. Piret,J. Quisiquater, J. Vandewall, P. Wouters., "Analytical charactersitics of the DES," CRYPTO'83, (1984).
-
(1984)
CRYPTO'83
-
-
Davio, M.1
Desmedt, Y.2
Fosseprez, M.3
Govaerts, R.4
Hulsbosch, J.5
Neutjens, P.6
Piret, P.7
Quisiquater, J.8
Vandewall, J.9
Wouters, P.10
-
5
-
-
0042416526
-
Results of an initial attempt to cryptanalyze the NBS data encryptoion standard
-
Stanford Univ. [Hel76]
-
[Hel76] M. Heilman, R. Merkel, R. Schroeppel, L. Washington, W. Diffie, P. Schweiter., "Results of an initial attempt to cryptanalyze the NBS data encryptoion standard," SEL 76-042, Stanford Univ. (1976).
-
(1976)
SEL 76-042
-
-
Heilman, M.1
Merkel, R.2
Schroeppel, R.3
Washington, L.4
Diffie, W.5
Schweiter, P.6
-
6
-
-
84996804416
-
Linear Cryptnalysis Using Multiple Approximations
-
LNCS 839, [KR94]
-
[KR94] B. Kaliski, and M. Robshaw., "Linear Cryptnalysis Using Multiple Approximations," CRYPTO'94, LNCS 839, pp. 26-38, (1994).
-
(1994)
CRYPTO'94
, pp. 26-38
-
-
Kaliski, B.1
Robshaw, M.2
-
7
-
-
84947931044
-
Non-Linear Approximations in Linear Cryptanalysis
-
LNCS 1070, [KR96]
-
[KR96] L. Knudsen, M. Robshaw., "Non-Linear Approximations in Linear Cryptanalysis," Eurocrypt'96, LNCS 1070, pp. 224-236, (1996).
-
(1996)
Eurocrypt'96
, pp. 224-236
-
-
Knudsen, L.1
Robshaw, M.2
-
8
-
-
84948961383
-
-
12 May, [Kwa98]
-
[Kwa98] M. Kwan., ''Bitslice DES," http://www.cs.mu.oz.au/~mkwan/bitslice, 12 May, (1998).
-
(1998)
Bitslice DES
-
-
Kwan, M.1
-
9
-
-
1642575733
-
Differential-Linear Cryptanalysis
-
LNCS 839, [LH94]
-
[LH94] S. Langford, M. Heilman., "Differential-Linear Cryptanalysis," CRYPTO'94, LNCS 839, pp. 17-25, (1994).
-
(1994)
CRYPTO'94
, pp. 17-25
-
-
Langford, S.1
Heilman, M.2
-
10
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
LNCS 765, [Mat93]
-
[Mat93] M. Matsui., "Linear Cryptanalysis Method for DES Cipher," Eurocrypt'93, LNCS 765, pp. 386-397, (1993).
-
(1993)
Eurocrypt'93
, pp. 386-397
-
-
Matsui, M.1
-
11
-
-
85028754650
-
The First Experimental Cryptanalysis of the Data Encryption Standard
-
LNCS 839, [Mat94]
-
[Mat94] M. Matsui., "The First Experimental Cryptanalysis of the Data Encryption Standard," CRYPTO'94, LNCS 839, pp. 1-11, (1994).
-
(1994)
CRYPTO'94
, pp. 1-11
-
-
Matsui, M.1
-
13
-
-
85027092918
-
Risa/Asir-a computer algebra system
-
ACM Press, (anonymous ftp from) [Nor92]
-
[Nor92] M. Noro, T. Takeshima., "Risa/Asir-a computer algebra system," Proceedings of ISSAC '92, ACM Press, pp. 387-396, (1992). (anonymous ftp from ftp://endeavor.fujitsu.co.jp/pub/isis/asir)
-
(1992)
Proceedings of ISSAC '92
, pp. 387-396
-
-
Noro, M.1
Takeshima, T.2
-
14
-
-
0020928825
-
Cryptanalysis of the Data Encryption Standard by method of formal coding
-
LNCS 149, [Sch82]
-
[Sch82] I. Schaumuller-Bichl., "Cryptanalysis of the Data Encryption Standard by method of formal coding," Proceedings of the workshop on cryptography, LNCS 149, pp. 235-255, (1982).
-
(1982)
Proceedings of the workshop on cryptography
, pp. 235-255
-
-
Schaumuller-Bichl, I.1
-
15
-
-
38049042096
-
Improved Fast Software Implementation of Block Ciphers
-
LNCS 1334, [SAM97]
-
[SAM97] T. Shimoyama, S. Amada, S. Moriai., "Improved Fast Software Implementation of Block Ciphers," Proceedings of ICICS'97, LNCS 1334, pp. 269-273, (1997).
-
(1997)
Proceedings of ICICS'97
, pp. 269-273
-
-
Shimoyama, T.1
Amada, S.2
Moriai, S.3
-
16
-
-
34548360945
-
Cryptography: Theory and Practice
-
[Sti95]
-
[Sti95] D. Stinson., "Cryptography: Theory and Practice," CRC Press Inc., (1995).
-
(1995)
CRC Press Inc
-
-
Stinson, D.1
-
17
-
-
0031653561
-
Linear Cryptanalysis by Linear Sieve Method
-
[THHK98]
-
[THHK98] M. Takeda, T. Hamade, K. Hisamatsu, T. Kaneko., "Linear Cryptanalysis by Linear Sieve Method," IEICE Trans., Vol.E81-A,No.l, pp. 82-87, (1998).
-
(1998)
IEICE Trans
, vol.E81-A
, Issue.1
, pp. 82-87
-
-
Takeda, M.1
Hamade, T.2
Hisamatsu, K.3
Kaneko, T.4
-
18
-
-
84882063056
-
Content-Addressable Search Engines and DES-like Systems
-
LNCS 740, [Way92]
-
[Way92] P. C. Wayner., "Content-Addressable Search Engines and DES-like Systems," CRYPTO'92, LNCS 740, pp. 575-586, (1992).
-
(1992)
CRYPTO'92
, pp. 575-586
-
-
Wayner, P.C.1
|