메뉴 건너뛰기




Volumn 1403, Issue , 1998, Pages 112-126

Differential-linear weak key classes of IDEA

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957688406     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054121     Document Type: Conference Paper
Times cited : (53)

References (17)
  • 1
    • 85006024828 scopus 로고
    • New types of cryptanalysis attacks using related keys
    • T. Helleseth ed., Springer-Verlag
    • E. Biham. New types of cryptanalysis attacks using related keys. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 398-409, 1994.
    • (1994) Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science , vol.765 , pp. 398-409
    • Biham, E.1
  • 2
    • 84903595110 scopus 로고
    • Differential cryptanalysis of DES-like cryptosystems
    • Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag
    • E. Biham and Shamir A. Differential cryptanalysis of DES-like cryptosystems. Advances in Cryptology, CRYPTO'90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 2-21, 1991.
    • (1991) Advances in Cryptology, CRYPTO'90 , pp. 2-21
    • Biham, E.1    Shamir, A.2
  • 3
    • 84957677472 scopus 로고
    • Technical Report 708, Technion, Israel Institute of Technology, Haifa, Israel, 1991. Also presented at Advances in Cryptology, CRYPTO’92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell ed., Springer-Verlag
    • E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. Technical Report 708, Technion, Israel Institute of Technology, Haifa, Israel, 1991. Also presented at Advances in Cryptology, CRYPTO’92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell ed., Springer-Verlag, pages 487-496, 1993.
    • (1993) Differential cryptanalysis of the full 16-round DES , pp. 487-496
    • Biham, E.1    Shamir, A.2
  • 4
    • 79957626687 scopus 로고    scopus 로고
    • Technical Report ESAT-COSIC Technical Report 96-2, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr
    • J. Borst. DifFerential-linear cryptanalysis of IDEA. Technical Report ESAT-COSIC Technical Report 96-2, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr. 1997.
    • (1997) DifFerential-linear cryptanalysis of IDEA
    • Borst, J.1
  • 5
    • 84957369098 scopus 로고    scopus 로고
    • Two attacks on reduced IDEA (extended abstract)
    • Lecture Notes in Computer Science, vol. 1233, W. Fumy ed., Springer-Verlag
    • J. Borst, L. R. Knudsen, and V. Rijmen. Two attacks on reduced IDEA (extended abstract). Advances in Cryptology, EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233, W. Fumy ed., Springer-Verlag, pages 1-13, 1997.
    • (1997) Advances in Cryptology, EUROCRYPT'97 , pp. 1-13
    • Borst, J.1    Knudsen, L.R.2    Rijmen, V.3
  • 6
    • 35048896884 scopus 로고
    • Technical Report ESAT-COSIC Technical Report 93/1, Department of Electrical Engineering, Katholieke Universiteit Leuven, March
    • J. Daemen, R. Govaerts, and J. Vandewalle. Cryptanalysis of 2,5 rounds of IDEA (extended abstract). Technical Report ESAT-COSIC Technical Report 93/1, Department of Electrical Engineering, Katholieke Universiteit Leuven, March 1993.
    • (1993) Cryptanalysis of 2,5 rounds of IDEA (extended abstract)
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 7
    • 85025673016 scopus 로고
    • Weak keys for IDEA
    • Lecture Notes in Computer Science, vol. 773, D. Stinson ed., Springer-Verlag
    • J. Daemen, R. Govaerts, and J. Vandewalle. Weak keys for IDEA. Advances in Cryptology, CRYPTO'93, Lecture Notes in Computer Science, vol. 773, D. Stinson ed., Springer-Verlag, pages 224-231, 1994.
    • (1994) Advances in Cryptology, CRYPTO'93 , pp. 224-231
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 8
    • 84957664477 scopus 로고
    • Generalisation of linear cryptanalysis and the applicability of Matsui’s piling-up lemma
    • Lecture Notes in Computer Science, vol. 921, L. C. Guillou, J. Quiquater eds., Springer-Verlag
    • C. Harpes, G. G. Kramer, and J.L. Massey. Generalisation of linear cryptanalysis and the applicability of Matsui’s piling-up lemma. Advances in Cryptology, EUROCRYPT'95, Lecture Notes in Computer Science, vol. 921, L. C. Guillou, J. Quiquater eds., Springer-Verlag, pages 24-38, 1995.
    • (1995) Advances in Cryptology, EUROCRYPT'95 , pp. 24-38
    • Harpes, C.1    Kramer, G.G.2    Massey, J.L.3
  • 10
    • 4243913431 scopus 로고    scopus 로고
    • Master’s Thesis, Department of Mathematics, Technical University of Denmark, January
    • T. Jakobsen. Correlation attacks on block ciphers. Master’s Thesis, Department of Mathematics, Technical University of Denmark, January, 1996.
    • (1996) Correlation attacks on block ciphers
    • Jakobsen, T.1
  • 11
    • 67650338267 scopus 로고    scopus 로고
    • Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES
    • Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag
    • J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Advances in Cryptology, CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag, pages 237-251, 1996.
    • (1996) Advances in Cryptology, CRYPTO'96 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 12
    • 84887806212 scopus 로고    scopus 로고
    • Technical Report ESAT-COSIC Technical Report 97-1, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr
    • L. R. Knudsen and V. Rijmen. Truncated differentials of IDEA. Technical Report ESAT-COSIC Technical Report 97-1, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr. 1997.
    • (1997) Truncated differentials of IDEA
    • Knudsen, L.R.1    Rijmen, V.2
  • 13
    • 0003445736 scopus 로고
    • ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz
    • X. Lai. On the design and security of block ciphers. ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz, 1992.
    • (1992) On the design and security of block ciphers
    • Lai, X.1
  • 15
    • 1642575733 scopus 로고
    • Differential-linear cryptanalysis
    • Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag
    • S. K. Langford and M. E. Heilman. Differential-linear cryptanalysis. Advances in Cryptology, CRYPTO’94, Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag, pages 17-25, 1994.
    • (1994) Advances in Cryptology, CRYPTO’94 , pp. 17-25
    • Langford, S.K.1    Heilman, M.E.2
  • 16
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag
    • M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 386-397, 1994.
    • (1994) Advances in Cryptology, EUROCRYPT'93 , pp. 386-397
    • Matsui, M.1
  • 17
    • 85028772160 scopus 로고
    • On the security of the IDEA block cipher
    • Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag
    • W. Meier. On the security of the IDEA block cipher. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 371-385, 1994.
    • (1994) Advances in Cryptology, EUROCRYPT'93 , pp. 371-385
    • Meier, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.