메뉴 건너뛰기




Volumn 1636, Issue , 1999, Pages 124-138

Miss in the middle attacks on IDEA and khufu

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84957694360     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48519-8_10     Document Type: Conference Paper
Times cited : (124)

References (29)
  • 3
    • 0012022741 scopus 로고    scopus 로고
    • Differential Cryptanalysis of Lucifer
    • I. Ben-Aroya, E. Biham, Differential Cryptanalysis of Lucifer, Journal of Crypto- logy, Vol. 9, No. 1, pp. 21-34, 1996.
    • (1996) Journal of Crypto- Logy , vol.9 , Issue.1 , pp. 21-34
    • Ben-Aroya, I.1    Biham, E.2
  • 4
    • 84955588617 scopus 로고
    • How to Strengthen DES Using Existing Hardware, Lec- ture Notes in Computer Science 917
    • Springer Verlag
    • E. Biham, A. Biryukov, How to Strengthen DES Using Existing Hardware, Lec- ture Notes in Computer Science 917, Advances in Cryptology - Proceedings of ASIACRYPT'94, pp. 398-412, Springer Verlag, 1995.
    • (1995) Advances in Cryptology - Proceedings of ASIACRYPT'94 , pp. 398-412
    • Biham, E.1    Biryukov, A.2
  • 7
    • 0028494723 scopus 로고
    • New Types of Cryptanalytic Attacks Using Related Keys
    • E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, J. of Crypto- logy, Vol. 7, pp. 229-246, 1994.
    • (1994) J. of Crypto- Logy , vol.7 , pp. 229-246
    • Biham, E.1
  • 8
    • 84957692171 scopus 로고    scopus 로고
    • From Differential Cryptanalysis to Ciphertext-Only Attacks, Lecture Notes in Computer Science 1462
    • Springer-Verlag
    • A. Biryukov, E. Kushilevitz, From Differential Cryptanalysis to Ciphertext-Only Attacks, Lecture Notes in Computer Science 1462, Advances in Cryptology - Pro- ceedings of CRYPTO'98, pp. 72-88, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - Pro- Ceedings of CRYPTO'98 , pp. 72-88
    • Biryukov, A.1    Kushilevitz, E.2
  • 9
    • 84957369098 scopus 로고    scopus 로고
    • Two Attacks on Reduced IDEA (Extended abstract), Lecture Notes in Computer Science 1223
    • Springer-Verlag
    • J. Borst, L. R. Knudsen, V. Rijmen, Two Attacks on Reduced IDEA (extended abstract), Lecture Notes in Computer Science 1223, Advances in Cryptology - Proceedings of EUROCRYPT'97, pp. 1-13, Springer-Verlag, 1997.
    • (1997) Advances in Cryptology - Proceedings of EUROCRYPT'97 , pp. 1-13
    • Borst, J.1    Knudsen, L.R.2    Rijmen, V.3
  • 10
    • 84957614902 scopus 로고
    • Cryptanalysis of 2,5 Rounds of IDEA (Extended abstract), Technical Report ESAT-COSIC Technical Report 93/1
    • Katholieke Universiteit Leuven
    • J. Daemen, R. Govaerts, J. Vandewalle, Cryptanalysis of 2,5 Rounds of IDEA (extended abstract), Technical Report ESAT-COSIC Technical Report 93/1, De- partment of Electrical Engineering, Katholieke Universiteit Leuven, March 1993.
    • (1993) De- Partment of Electrical Engineering
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 13
    • 84955569014 scopus 로고    scopus 로고
    • On Applying Linear Cryptanalysis to IDEA, Lecture Notes in Computer Science 1163
    • Springer-Verlag
    • P. Hawkes, L. O'Connor, On Applying Linear Cryptanalysis to IDEA, Lecture Notes in Computer Science 1163, Advances in Cryptology - Proceedings of ASIACRYPT'96, pp. 105-115, Springer-Verlag, 1996.
    • (1996) Advances in Cryptology - Proceedings of ASIACRYPT'96 , pp. 105-115
    • Hawkes, P.1    O'connor, L.2
  • 14
    • 24944542542 scopus 로고    scopus 로고
    • Differential-Linear Weak Key Classes of IDEA, Lecture Notes in Com- puter Science 1403
    • Springer-Verlag
    • P. Hawkes, Differential-Linear Weak Key Classes of IDEA, Lecture Notes in Com- puter Science 1403, Advances in Cryptology - Proceedings of EUROCRYPT'98, pp. 112-126, Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - Proceedings of EUROCRYPT'98 , pp. 112-126
    • Hawkes, P.1
  • 15
    • 84957694404 scopus 로고    scopus 로고
    • Cryptanalysis of Block ciphers with probabilistic Non-linear relations of Low Degree, Lecture Notes in Computer Science 1462
    • Springer-Verlag
    • T. Jakobsen, Cryptanalysis of Block ciphers with probabilistic Non-linear relations of Low Degree, Lecture Notes in Computer Science 1462, Advances in Cryptology - Proceedings of CRYPTO'98, pp. 212-222, Springer-Verlag 1998.
    • (1998) Advances in Cryptology - Proceedings of CRYPTO'98 , pp. 212-222
    • Jakobsen, T.1
  • 16
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science 1109
    • J. Kelsey, B. Schneier, D. Wagner, Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science 1109, Ad- vances in Cryptology - Proceedings of CRYPTO'96, pp. 237-251, Springer-Verlag, 1996.
    • (1996) Ad- Vances in Cryptology - Proceedings of CRYPTO'96 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 19
    • 85011105685 scopus 로고
    • A Proposal for a New Block Encryption Standard, Lecture Notes in Computer Science 473
    • Springer-Verlag
    • X. Lai, J. L. Massey, A Proposal for a New Block Encryption Standard, Lecture Notes in Computer Science 473, Advances in Cryptology - Proceedings of EU- ROCRYPT'90, pp. 389-404, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology - Proceedings of EU- ROCRYPT'90 , pp. 389-404
    • Lai, X.1    Massey, J.L.2
  • 21
    • 0347585053 scopus 로고    scopus 로고
    • New Block Encryption Algorithm MISTY, Lecture Notes in Computer Science 1267
    • Springer-Verlag
    • M. Matsui, New Block Encryption Algorithm MISTY, Lecture Notes in Computer Science 1267, Fast Software Encryption - 4th International Workshop (FSE'97), pp. 54-68, Springer-Verlag, 1997.
    • (1997) Fast Software Encryption - 4Th International Workshop (FSE'97) , pp. 54-68
    • Matsui, M.1
  • 23
    • 26444432173 scopus 로고
    • On the Security of the IDEA Block Cipher, Lecture Notes in Computer Science 765
    • Springer-Verlag
    • W. Meier, On the Security of the IDEA Block Cipher, Lecture Notes in Computer Science 765, Advances in Cryptology - Proceedings of EUROCRYPT'93, pp. 371-385, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - Proceedings of EUROCRYPT'93 , pp. 371-385
    • Meier, W.1
  • 24
    • 0005270932 scopus 로고
    • Fast Software Encryption Functions, Lecture Notes in Computer Science 537
    • Springer-Verlag
    • R. C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science 537, Advances in Cryptology - Proceedings of CRYPTO'90, pp. 476-501, Springer-Verlag, 1990.
    • (1990) Advances in Cryptology - Proceedings of CRYPTO'90 , pp. 476-501
    • Merkle, R.C.1
  • 27
    • 0029632010 scopus 로고
    • Provable Security Against a Differential Attack
    • K. Nyberg and L. R. Knudsen, Provable Security Against a Differential Attack, Journal of Cryptology, Vol. 8, No. 1, pp. 27-37, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.1 , pp. 27-37
    • Nyberg, K.1    Knudsen, L.R.2
  • 28
    • 84957686347 scopus 로고    scopus 로고
    • Version 2.0, 1998. Availa- ble at the National Institute of Standards and Technology's web-page
    • Skipjack and KEA Algorithm Specifications, Version 2.0, 1998. Availa- ble at the National Institute of Standards and Technology's web-page, http://csrc.nist.gov/encryption/skipjack-kea.htm.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.