-
3
-
-
0012022741
-
Differential Cryptanalysis of Lucifer
-
I. Ben-Aroya, E. Biham, Differential Cryptanalysis of Lucifer, Journal of Crypto- logy, Vol. 9, No. 1, pp. 21-34, 1996.
-
(1996)
Journal of Crypto- Logy
, vol.9
, Issue.1
, pp. 21-34
-
-
Ben-Aroya, I.1
Biham, E.2
-
4
-
-
84955588617
-
How to Strengthen DES Using Existing Hardware, Lec- ture Notes in Computer Science 917
-
Springer Verlag
-
E. Biham, A. Biryukov, How to Strengthen DES Using Existing Hardware, Lec- ture Notes in Computer Science 917, Advances in Cryptology - Proceedings of ASIACRYPT'94, pp. 398-412, Springer Verlag, 1995.
-
(1995)
Advances in Cryptology - Proceedings of ASIACRYPT'94
, pp. 398-412
-
-
Biham, E.1
Biryukov, A.2
-
5
-
-
84957634424
-
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
-
Springer-Verlag
-
E. Biham, A. Biryukov, A. Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Lecture Notes in Computer Science, Advances in Cryptology - Proceedings of EUROCRYPT'99, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science, Advances in Cryptology - Proceedings of EUROCRYPT'99
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
7
-
-
0028494723
-
New Types of Cryptanalytic Attacks Using Related Keys
-
E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, J. of Crypto- logy, Vol. 7, pp. 229-246, 1994.
-
(1994)
J. of Crypto- Logy
, vol.7
, pp. 229-246
-
-
Biham, E.1
-
8
-
-
84957692171
-
From Differential Cryptanalysis to Ciphertext-Only Attacks, Lecture Notes in Computer Science 1462
-
Springer-Verlag
-
A. Biryukov, E. Kushilevitz, From Differential Cryptanalysis to Ciphertext-Only Attacks, Lecture Notes in Computer Science 1462, Advances in Cryptology - Pro- ceedings of CRYPTO'98, pp. 72-88, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - Pro- Ceedings of CRYPTO'98
, pp. 72-88
-
-
Biryukov, A.1
Kushilevitz, E.2
-
9
-
-
84957369098
-
Two Attacks on Reduced IDEA (Extended abstract), Lecture Notes in Computer Science 1223
-
Springer-Verlag
-
J. Borst, L. R. Knudsen, V. Rijmen, Two Attacks on Reduced IDEA (extended abstract), Lecture Notes in Computer Science 1223, Advances in Cryptology - Proceedings of EUROCRYPT'97, pp. 1-13, Springer-Verlag, 1997.
-
(1997)
Advances in Cryptology - Proceedings of EUROCRYPT'97
, pp. 1-13
-
-
Borst, J.1
Knudsen, L.R.2
Rijmen, V.3
-
10
-
-
84957614902
-
Cryptanalysis of 2,5 Rounds of IDEA (Extended abstract), Technical Report ESAT-COSIC Technical Report 93/1
-
Katholieke Universiteit Leuven
-
J. Daemen, R. Govaerts, J. Vandewalle, Cryptanalysis of 2,5 Rounds of IDEA (extended abstract), Technical Report ESAT-COSIC Technical Report 93/1, De- partment of Electrical Engineering, Katholieke Universiteit Leuven, March 1993.
-
(1993)
De- Partment of Electrical Engineering
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
11
-
-
85025673016
-
Weak Keys of IDEA, Lecture Notes in Computer Science 773
-
Springer-Verlag
-
J. Daemen, R. Govaerts, J. Vandewalle, Weak Keys of IDEA, Lecture Notes in Computer Science 773, Advances in Cryptology - Proceedings of CRYPTO'93, pp. 224-231, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Proceedings of CRYPTO'93
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
12
-
-
84983734469
-
A chosen plaintext attack of the 16-round Khufu cryp- tosystem
-
Springer-Verlag
-
H. Gilbert, P. Chauvaud, A chosen plaintext attack of the 16-round Khufu cryp- tosystem, Lecture Notes in Computer Science 839, Advances in Cryptology - Pro- ceedings of CRYPTO'94, pp. 359-368, Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science 839, Advances in Cryptology - Pro- Ceedings of CRYPTO'94
, pp. 359-368
-
-
Gilbert, H.1
Chauvaud, P.2
-
13
-
-
84955569014
-
On Applying Linear Cryptanalysis to IDEA, Lecture Notes in Computer Science 1163
-
Springer-Verlag
-
P. Hawkes, L. O'Connor, On Applying Linear Cryptanalysis to IDEA, Lecture Notes in Computer Science 1163, Advances in Cryptology - Proceedings of ASIACRYPT'96, pp. 105-115, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Proceedings of ASIACRYPT'96
, pp. 105-115
-
-
Hawkes, P.1
O'connor, L.2
-
14
-
-
24944542542
-
Differential-Linear Weak Key Classes of IDEA, Lecture Notes in Com- puter Science 1403
-
Springer-Verlag
-
P. Hawkes, Differential-Linear Weak Key Classes of IDEA, Lecture Notes in Com- puter Science 1403, Advances in Cryptology - Proceedings of EUROCRYPT'98, pp. 112-126, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - Proceedings of EUROCRYPT'98
, pp. 112-126
-
-
Hawkes, P.1
-
15
-
-
84957694404
-
Cryptanalysis of Block ciphers with probabilistic Non-linear relations of Low Degree, Lecture Notes in Computer Science 1462
-
Springer-Verlag
-
T. Jakobsen, Cryptanalysis of Block ciphers with probabilistic Non-linear relations of Low Degree, Lecture Notes in Computer Science 1462, Advances in Cryptology - Proceedings of CRYPTO'98, pp. 212-222, Springer-Verlag 1998.
-
(1998)
Advances in Cryptology - Proceedings of CRYPTO'98
, pp. 212-222
-
-
Jakobsen, T.1
-
16
-
-
67650338267
-
Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science 1109
-
J. Kelsey, B. Schneier, D. Wagner, Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES, Lecture Notes in Computer Science 1109, Ad- vances in Cryptology - Proceedings of CRYPTO'96, pp. 237-251, Springer-Verlag, 1996.
-
(1996)
Ad- Vances in Cryptology - Proceedings of CRYPTO'96
, pp. 237-251
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
19
-
-
85011105685
-
A Proposal for a New Block Encryption Standard, Lecture Notes in Computer Science 473
-
Springer-Verlag
-
X. Lai, J. L. Massey, A Proposal for a New Block Encryption Standard, Lecture Notes in Computer Science 473, Advances in Cryptology - Proceedings of EU- ROCRYPT'90, pp. 389-404, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Proceedings of EU- ROCRYPT'90
, pp. 389-404
-
-
Lai, X.1
Massey, J.L.2
-
20
-
-
85028910917
-
Markov Ciphers and Differential Cryptanalysis
-
Springer-Verlag
-
X. Lai, J. L. Massey, S. Murphy, Markov Ciphers and Differential Cryptanalysis, Lecture Notes in Computer Science 547, Advances in Cryptology - Proceedings of EUROCRYPT'91, pp. 17-38, Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science 547, Advances in Cryptology - Proceedings of EUROCRYPT'91
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
Murphy, S.3
-
21
-
-
0347585053
-
New Block Encryption Algorithm MISTY, Lecture Notes in Computer Science 1267
-
Springer-Verlag
-
M. Matsui, New Block Encryption Algorithm MISTY, Lecture Notes in Computer Science 1267, Fast Software Encryption - 4th International Workshop (FSE'97), pp. 54-68, Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption - 4Th International Workshop (FSE'97)
, pp. 54-68
-
-
Matsui, M.1
-
23
-
-
26444432173
-
On the Security of the IDEA Block Cipher, Lecture Notes in Computer Science 765
-
Springer-Verlag
-
W. Meier, On the Security of the IDEA Block Cipher, Lecture Notes in Computer Science 765, Advances in Cryptology - Proceedings of EUROCRYPT'93, pp. 371-385, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Proceedings of EUROCRYPT'93
, pp. 371-385
-
-
Meier, W.1
-
24
-
-
0005270932
-
Fast Software Encryption Functions, Lecture Notes in Computer Science 537
-
Springer-Verlag
-
R. C. Merkle, Fast Software Encryption Functions, Lecture Notes in Computer Science 537, Advances in Cryptology - Proceedings of CRYPTO'90, pp. 476-501, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - Proceedings of CRYPTO'90
, pp. 476-501
-
-
Merkle, R.C.1
-
25
-
-
0023830454
-
Fast Data Encryption Algorithm FEAL-8
-
S. Miyaguchi, A. Shiraishi, A. Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of Electrical Communications Laboratories, Vol. 36, No. 4, pp. 433-437, 1988.
-
(1988)
Review of Electrical Communications Laboratories
, vol.36
, Issue.4
, pp. 433-437
-
-
Miyaguchi, S.1
Shiraishi, A.2
Shimizu, A.3
-
27
-
-
0029632010
-
Provable Security Against a Differential Attack
-
K. Nyberg and L. R. Knudsen, Provable Security Against a Differential Attack, Journal of Cryptology, Vol. 8, No. 1, pp. 27-37, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 27-37
-
-
Nyberg, K.1
Knudsen, L.R.2
-
28
-
-
84957686347
-
-
Version 2.0, 1998. Availa- ble at the National Institute of Standards and Technology's web-page
-
Skipjack and KEA Algorithm Specifications, Version 2.0, 1998. Availa- ble at the National Institute of Standards and Technology's web-page, http://csrc.nist.gov/encryption/skipjack-kea.htm.
-
-
-
-
29
-
-
84947911088
-
Improving the High Order Differential Attack and Cryptanalysis of the KN Cipher
-
Japan, Springer-Verlag
-
T. Shimoyama, S. Moriai, T. Kaneko, Improving the High Order Differential Attack and Cryptanalysis of the KN Cipher, Lecture Notes in Computer Science 1396, Proceedings of the First International Workshop on Information Security (ISW'97) (Japan), pp. 32-42, Springer-Verlag 1997.
-
(1997)
Lecture Notes in Computer Science 1396, Proceedings of the First International Workshop on Information Security (ISW'97)
, pp. 32-42
-
-
Shimoyama, T.1
Moriai, S.2
Kaneko, T.3
|