-
1
-
-
4043177059
-
-
submitted to NESSIE
-
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moria, Junko Nakajima, Toshio Tokita, Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, submitted to NESSIE, 2000.
-
(2000)
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moria, S.5
Nakajima, J.6
Tokita, T.7
-
5
-
-
84958641478
-
Differential Fault of Secret-Key Cryptosystems
-
Lecture Notes in Computer Science 1294, Springer-Verlag
-
Eli Biham, Adi Shamir, Differential Fault of Secret-Key Cryptosystems, Advances in Cryptology, proceedings of Crypto’97, Lecture Notes in Computer Science 1294, Springer-Verlag, pp. 513–525, 1997.
-
(1997)
Advances in Cryptology, Proceedings of Crypto’97
, pp. 513-525
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
84958762555
-
The Cipher Shark
-
Lecture Notes in Computer Science 1039, Dieter Gollmann, Ed., Springer-Verlag
-
Antoon Bosselaers, Joan Daemen, Erik De Win, Bart Preneel, Vincent Rijmen, The Cipher Shark, proceedings of Fast Software Encryption’96, Lecture Notes in Computer Science 1039, Dieter Gollmann, Ed., Springer-Verlag, pp. 99–112, 1996.
-
(1996)
Proceedings of Fast Software Encryption’96
, pp. 99-112
-
-
Bosselaers, A.1
Daemen, J.2
De Win, E.3
Preneel, B.4
Rijmen, V.5
-
7
-
-
84947444236
-
The Block Cipher Square
-
Lecture Notes in Computer Science 1267, Eli Biham, Ed., Springer-Verlag
-
Joan Daemen, Lars R. Knudsen, Vincent Rijmen, The Block Cipher Square, proceedings of Fast Software Encryption’97, Lecture Notes in Computer Science 1267, Eli Biham, Ed., Springer-Verlag, pp. 149–165, 1997.
-
(1997)
Proceedings of Fast Software Encryption’97
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
8
-
-
0004181422
-
-
submitted to the Advanced Encryption Standard (AES) contest
-
Joan Daemen, Vincent Rijmen, AES Proposal: Rijndael, submitted to the Advanced Encryption Standard (AES) contest, 1998.
-
(1998)
AES Proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
9
-
-
84949194630
-
A Simple Algebraic Representation o f Rijndael
-
Lecture Notes in Computer Science 2259, Serge Vaudenay and Amr Youssef, Eds., Springer-Verlag
-
Niels Ferguson, Richard Schroeppel, Doug Whiting, A Simple Algebraic Representation o f Rijndael, proceedings of Selected Areas in Cryptography, Lecture Notes in Computer Science 2259, Serge Vaudenay and Amr Youssef, Eds., Springer-Verlag, pp. 103–111, 2001.
-
(2001)
Proceedings of Selected Areas in Cryptography
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
10
-
-
84969327483
-
Scream: A Software-Efficient Stream Cipher
-
Shai Halevi, Don Coppersmith, Charanjit Jutla, Scream: a Software-Efficient Stream Cipher, preproceedings of Fast Software Encryption 2002, pp. 190–204, 2002.
-
(2002)
Preproceedings of Fast Software Encryption 2002
, pp. 190-204
-
-
Halevi, S.1
Coppersmith, D.2
Jutla, C.3
-
11
-
-
84947929289
-
The Interpolation Attack on Block Ciphers
-
Lecture Notes in Computer Science 1267, Eli Biham, Ed., Springer-Verlag
-
Thomas Jakobsen, Lars R. Knudsen, The Interpolation Attack on Block Ciphers, proceedings of Fast Software Encryption’97, Lecture Notes in Computer Science 1267, Eli Biham, Ed., Springer-Verlag, pp. 28–40, 1997.
-
(1997)
Proceedings of Fast Software Encryption’97
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
12
-
-
84939573910
-
Differential Power Analysis
-
Lecture Notes in Computer Science 1666, Springer-Verlag
-
Paul Kocher, Joshua Jaffe, Benjamin Jun, Differential Power Analysis, Advances in Cryptology, proceedings of Crypto’99, Lecture Notes in Computer Science 1666, Springer-Verlag, pp. 388–397, 1999.
-
(1999)
Advances in Cryptology, Proceedings of Crypto’99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
35248864413
-
-
submitted to NESSIE
-
James L. Massey, Gurgen H. Khachatrian, Melsik K. Kuregian, Nomination of Safer++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption(NESSIE), submitted to NESSIE, 2000.
-
(2000)
Nomination of Safer++ as Candidate Algorithm for the New European Schemes for Signatures, Integrity, and Encryption(Nessie)
-
-
Massey, J.L.1
Khachatrian, G.H.2
Kuregian, M.K.3
-
15
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Lecture Notes in Computer Science 765, T. Helleseth, Ed., Springer-Verlag
-
Mitsuru Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology, proceedings of Eurocrypt’93, Lecture Notes in Computer Science 765, T. Helleseth, Ed., Springer-Verlag, pp. 386–397, 1994.
-
(1994)
Advances in Cryptology, Proceedings of Eurocrypt’93
, pp. 386-397
-
-
Matsui, M.1
-
16
-
-
84958820631
-
-
Nippon Telegraph and Telephone Corporation, submitted to the Advanced Encryption Standard (AES) contest
-
Nippon Telegraph and Telephone Corporation, AES Proposal: E2, submitted to the Advanced Encryption Standard (AES) contest, 1998.
-
(1998)
AES Proposal: E2
-
-
-
17
-
-
3042644992
-
-
National Institute of Standards and Technology, Federal Information Processing Standard, FIPS-197
-
National Institute of Standards and Technology, FIPS-197:Advanced Encryption Standard, Federal Information Processing Standard, FIPS-197, 2001.
-
(2001)
Fips-197:Advanced Encryption Standard
-
-
-
18
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
Ronald L. Rivest, Adi Shamir, Leonard Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, 21(2):120–126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|