-
1
-
-
84949218850
-
A 128-bit block ciher suitable for multiple platforms - Design and analysis
-
Douglas R. Stinson and Stafford Tavares, editors, Springer
-
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, and Toshio Tokita. Camellia: A 128-bit block ciher suitable for multiple platforms - design and analysis. In Douglas R. Stinson and Stafford Tavares, editors, Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, pages 39–56. Springer, 2000.
-
(2000)
Selected Areas in Cryptography, Volume 2012 of Lecture Notes in Computer Science
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Camellia, T.T.7
-
2
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystem
-
Alfred J. Menezes and Scott A. Vanstone, editors, Springer- Verlag, Berlin
-
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystem. In Alfred J. Menezes and Scott A. Vanstone, editors, Advances in Cryptology - Crypto’90, volume 537 of Lecture Notes in Computer Science, pages 2–21. Springer- Verlag, Berlin, 1991.
-
(1991)
Advances in Cryptology - Crypto’90, Volume 537 of Lecture Notes in Computer Science
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosystems
-
Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
84890522850
-
Communication Theory of Secrecy System
-
October
-
C.E. Shannon. Communication Theory of Secrecy System. Bell System Technical Journal, 28:656–715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
84948980795
-
Correlation matrices
-
Bart Preneel, editor, Springer
-
Joan Daemen, René Govaerts, and Joos Vandwalle. Correlation matrices. In Bart Preneel, editor, Fast Software Encryption, Second International Workshop, volume 1008 of Lecture Notes in Computer Science, pages 275–285. Springer, 1994.
-
(1994)
Fast Software Encryption, Second International Workshop, Volume 1008 of Lecture Notes in Computer Science
, pp. 275-285
-
-
Daemen, J.1
Govaerts, R.2
Vandwalle, J.3
-
6
-
-
84947444236
-
The block cipher square
-
Eli Biham, editor, Springer
-
Joan Daemen, Lars R. Knudsen, and Vincent Rijmen. The block cipher square. In Eli Biham, editor, Fast Software Encryption, 4th International Workshop, volume 1267 of Lecture Notes in Computer Science, pages 149–165. Springer, 1997.
-
(1997)
Fast Software Encryption, 4Th International Workshop, Volume 1267 of Lecture Notes in Computer Science
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
8
-
-
0041495558
-
Provable security against differential and linear cryptanalysis for the spn structure
-
Bruce Schneier, editor
-
Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Donghyeon Cheon, and Inho Cho. Provable security against differential and linear cryptanalysis for the spn structure. In Bruce Schneier, editor, Fast Soft Encryption, 7th International Workshop, pages 273–283, 2000.
-
(2000)
Fast Soft Encryption, 7Th International Workshop
, pp. 273-283
-
-
Hong, S.1
Lee, S.2
Lim, J.3
Sung, J.4
Cheon, D.5
Cho, I.6
-
9
-
-
0035667545
-
Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks
-
Ju-Sung Kang, Seokhie Hong, Sangjin Lee, Okyeon Yi, Choonsik Park, and Jongin Lim. Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI Journal, 23(4):158–167, 2001.
-
(2001)
ETRI Journal
, vol.23
, Issue.4
, pp. 158-167
-
-
Kang, J.-S.1
Hong, S.2
Lee, S.3
Yi, O.4
Park, C.5
Lim, J.6
-
10
-
-
84949188599
-
Improvingthe upper bound on the maximum average linear hull probability for rijndael
-
Serge Vaudenay and Amr M. Youssef, editors, Springer
-
Liam Keliher, Henk Meijer, and Stafford Tavares. Improvingthe upper bound on the maximum average linear hull probability for rijndael. In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography, 8th Annual International Workshop, volume 2259 of Lecture Notes in Computer Science, pages 112–128. Springer, 2001.
-
(2001)
Selected Areas in Cryptography, 8Th Annual International Workshop, Volume 2259 of Lecture Notes in Computer Science
, pp. 112-128
-
-
Keliher, L.1
Meijer, H.2
Tavares, S.3
-
11
-
-
84945126880
-
New method for upper bounding the maximum average linear hull probability for spns
-
Birgit Pfitzmann, editor, Springer-Verlag, Berlin
-
Liam Keliher, Henk Meijer, and Stafford Tavares. New method for upper bounding the maximum average linear hull probability for spns. In Birgit Pfitzmann, editor, Advances in Cryptology - Eurocrypt 2001, volume 2045 of Lecture Notes in Computer Science, pages 420–436. Springer-Verlag, Berlin, 2001.
-
(2001)
Advances in Cryptology - Eurocrypt 2001, Volume 2045 of Lecture Notes in Computer Science
, pp. 420-436
-
-
Keliher, L.1
Meijer, H.2
Tavares, S.3
-
13
-
-
84957612187
-
A revised version of crypton - Crypton v1.0 -
-
Lars Knudsen, editor, Springer
-
Chae Hoon Lim. A revised version of crypton - crypton v1.0 -. In Lars Knudsen, editor, Fast Software Encryption, 6th International Workshop, volume 1636 of Lecture Notes in Computer Science, pages 31–45. Springer, 1999.
-
(1999)
Fast Software Encryption, 6Th International Workshop, Volume 1636 of Lecture Notes in Computer Science
, pp. 31-45
-
-
Lim, C.H.1
-
14
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Tor Helleseth, editor, Springer-Verlag, Berlin
-
Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In Tor Helleseth, editor, Advances in Cryptology - Eurocrypt’93, volume 765 of Lecture Notes in Computer Science, pages 386–397. Springer-Verlag, Berlin, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt’93, Volume 765 of Lecture Notes in Computer Science
, pp. 386-397
-
-
Matsui, M.1
-
15
-
-
84958788581
-
-
NTT-Nippon Telegraph and Telephone Corporation. E2: Efficient Encryption algorithm, AES Proposal
-
NTT-Nippon Telegraph and Telephone Corporation. E2: Efficient Encryption algorithm, AES Proposal. http://www.nist.gov/aes, 1998.
-
(1998)
-
-
|