-
1
-
-
85006024828
-
New types of cryptanalysis attacks using related keys
-
T. Helleseth ed., Springer-Verlag
-
E. Biham. New types of cryptanalysis attacks using related keys. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 398-409, 1994.
-
(1994)
Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science
, vol.765
, pp. 398-409
-
-
Biham, E.1
-
2
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag
-
E. Biham and Shamir A. Differential cryptanalysis of DES-like cryptosystems. Advances in Cryptology, CRYPTO'90, Lecture Notes in Computer Science, vol. 537, A. J. Menezes and S. A. Vanstone ed., Springer-Verlag, pages 2-21, 1991.
-
(1991)
Advances in Cryptology, CRYPTO'90
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
84957677472
-
-
Technical Report 708, Technion, Israel Institute of Technology, Haifa, Israel, 1991. Also presented at Advances in Cryptology, CRYPTO’92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell ed., Springer-Verlag
-
E. Biham and A. Shamir. Differential cryptanalysis of the full 16-round DES. Technical Report 708, Technion, Israel Institute of Technology, Haifa, Israel, 1991. Also presented at Advances in Cryptology, CRYPTO’92, Lecture Notes in Computer Science, vol. 740, E. F. Brickell ed., Springer-Verlag, pages 487-496, 1993.
-
(1993)
Differential cryptanalysis of the full 16-round DES
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
79957626687
-
-
Technical Report ESAT-COSIC Technical Report 96-2, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr
-
J. Borst. DifFerential-linear cryptanalysis of IDEA. Technical Report ESAT-COSIC Technical Report 96-2, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr. 1997.
-
(1997)
DifFerential-linear cryptanalysis of IDEA
-
-
Borst, J.1
-
5
-
-
84957369098
-
Two attacks on reduced IDEA (extended abstract)
-
Lecture Notes in Computer Science, vol. 1233, W. Fumy ed., Springer-Verlag
-
J. Borst, L. R. Knudsen, and V. Rijmen. Two attacks on reduced IDEA (extended abstract). Advances in Cryptology, EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233, W. Fumy ed., Springer-Verlag, pages 1-13, 1997.
-
(1997)
Advances in Cryptology, EUROCRYPT'97
, pp. 1-13
-
-
Borst, J.1
Knudsen, L.R.2
Rijmen, V.3
-
6
-
-
35048896884
-
-
Technical Report ESAT-COSIC Technical Report 93/1, Department of Electrical Engineering, Katholieke Universiteit Leuven, March
-
J. Daemen, R. Govaerts, and J. Vandewalle. Cryptanalysis of 2,5 rounds of IDEA (extended abstract). Technical Report ESAT-COSIC Technical Report 93/1, Department of Electrical Engineering, Katholieke Universiteit Leuven, March 1993.
-
(1993)
Cryptanalysis of 2,5 rounds of IDEA (extended abstract)
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
7
-
-
85025673016
-
Weak keys for IDEA
-
Lecture Notes in Computer Science, vol. 773, D. Stinson ed., Springer-Verlag
-
J. Daemen, R. Govaerts, and J. Vandewalle. Weak keys for IDEA. Advances in Cryptology, CRYPTO'93, Lecture Notes in Computer Science, vol. 773, D. Stinson ed., Springer-Verlag, pages 224-231, 1994.
-
(1994)
Advances in Cryptology, CRYPTO'93
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
8
-
-
84957664477
-
Generalisation of linear cryptanalysis and the applicability of Matsui’s piling-up lemma
-
Lecture Notes in Computer Science, vol. 921, L. C. Guillou, J. Quiquater eds., Springer-Verlag
-
C. Harpes, G. G. Kramer, and J.L. Massey. Generalisation of linear cryptanalysis and the applicability of Matsui’s piling-up lemma. Advances in Cryptology, EUROCRYPT'95, Lecture Notes in Computer Science, vol. 921, L. C. Guillou, J. Quiquater eds., Springer-Verlag, pages 24-38, 1995.
-
(1995)
Advances in Cryptology, EUROCRYPT'95
, pp. 24-38
-
-
Harpes, C.1
Kramer, G.G.2
Massey, J.L.3
-
9
-
-
84955569014
-
On applying Unear cryptanalysis to IDEA
-
K. Kim, T. Matsumoto eds., Springer-Verlag
-
P. Hawkes and L. O’Connor. On applying Unear cryptanalysis to IDEA. Advances in Cryptology, ASIACRYPT’96, Lecture Notes in Computer Science, vol. 1163, K. Kim, T. Matsumoto eds., Springer-Verlag, pages 105-115, 1996.
-
(1996)
Advances in Cryptology, ASIACRYPT’96, Lecture Notes in Computer Science
, vol.1163
, pp. 105-115
-
-
Hawkes, P.1
O’Connor, L.2
-
10
-
-
4243913431
-
-
Master’s Thesis, Department of Mathematics, Technical University of Denmark, January
-
T. Jakobsen. Correlation attacks on block ciphers. Master’s Thesis, Department of Mathematics, Technical University of Denmark, January, 1996.
-
(1996)
Correlation attacks on block ciphers
-
-
Jakobsen, T.1
-
11
-
-
67650338267
-
Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES
-
Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag
-
J. Kelsey, B. Schneier, and D. Wagner. Key-schedule cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Advances in Cryptology, CRYPTO'96, Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag, pages 237-251, 1996.
-
(1996)
Advances in Cryptology, CRYPTO'96
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
12
-
-
84887806212
-
-
Technical Report ESAT-COSIC Technical Report 97-1, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr
-
L. R. Knudsen and V. Rijmen. Truncated differentials of IDEA. Technical Report ESAT-COSIC Technical Report 97-1, Department of Electrical Engineering, Katholieke Universiteit Leuven, Febr. 1997.
-
(1997)
Truncated differentials of IDEA
-
-
Knudsen, L.R.1
Rijmen, V.2
-
13
-
-
0003445736
-
-
ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz
-
X. Lai. On the design and security of block ciphers. ETH Series in Information Processing, editor J. Massey, Hartung-Gorre Verlag Konstanz, 1992.
-
(1992)
On the design and security of block ciphers
-
-
Lai, X.1
-
14
-
-
85028910917
-
Markov ciphers and differential cryptanalysis
-
D. W. Davies ed., Springer-Verlag
-
X. Lai, J. Massey, and S. Murphy. Markov ciphers and differential cryptanalysis. Advances in Cryptology, EUROCRYPT'91, Lecture Notes in Computer Science, vol. 547, D. W. Davies ed., Springer-Verlag, pages 17-38, 1991.
-
(1991)
Advances in Cryptology, EUROCRYPT'91, Lecture Notes in Computer Science
, vol.547
, pp. 17-38
-
-
Lai, X.1
Massey, J.2
Murphy, S.3
-
15
-
-
1642575733
-
Differential-linear cryptanalysis
-
Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag
-
S. K. Langford and M. E. Heilman. Differential-linear cryptanalysis. Advances in Cryptology, CRYPTO’94, Lecture Notes in Computer Science, vol. 839, Y. G. Desmedt ed., Springer-Verlag, pages 17-25, 1994.
-
(1994)
Advances in Cryptology, CRYPTO’94
, pp. 17-25
-
-
Langford, S.K.1
Heilman, M.E.2
-
16
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 386-397, 1994.
-
(1994)
Advances in Cryptology, EUROCRYPT'93
, pp. 386-397
-
-
Matsui, M.1
-
17
-
-
85028772160
-
On the security of the IDEA block cipher
-
Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag
-
W. Meier. On the security of the IDEA block cipher. Advances in Cryptology, EUROCRYPT'93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, pages 371-385, 1994.
-
(1994)
Advances in Cryptology, EUROCRYPT'93
, pp. 371-385
-
-
Meier, W.1
|