-
3
-
-
85023205150
-
Matrix multiplication via arithmetic progressions
-
Don Coppersmith, Shmuel Winograd: “Matrix multiplication via arithmetic progressions”; J. Symbolic Computation (1990), 9, pp. 251-280.
-
(1990)
J. Symbolic Computation
, vol.9
, pp. 251-280
-
-
Coppersmith, D.1
Winograd, S.2
-
4
-
-
0004181422
-
-
The latest revised version of the proposal is available on the internet
-
Joan Daemen, Vincent Rijmen: AES proposal: Rijndael; The latest revised version of the proposal is available on the internet, http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
-
AES Proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
5
-
-
84958969583
-
Solving Underdefined Systems of Multivariate Quadratic Equations
-
LNCS 2254, Springer
-
Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier: Solving Underdefined Systems of Multivariate Quadratic Equations; PKC 2002, LNCS 2254, Springer, pp. 211-225.
-
PKC 2002
, pp. 211-225
-
-
Courtois, N.1
Goubin, L.2
Meier, W.3
Tacier, J.-D.4
-
6
-
-
84937560136
-
The security of Hidden Field Equations (HFE)
-
San Francisco 8-12 April, LNCS2020, Springer-Verlag
-
Nicolas Courtois: The security of Hidden Field Equations (HFE); Cryptographers’ Track Rsa Conference 2001, San Francisco 8-12 April 2001, LNCS2020, Springer-Verlag, pp. 266-281.
-
(2001)
Cryptographers’ Track Rsa Conference 2001
, pp. 266-281
-
-
Courtois, N.1
-
7
-
-
0001820140
-
Cryptography and computer privacy
-
May
-
Horst Feistel: Cryptography and computer privacy; Scientific American, vol. 228, No. 5, pp. 15-23, May 1973.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
8
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
LNCS 2259, Springer
-
Niels Ferguson, Richard Schroeppel and Doug Whiting: A simple algebraic representation of Rijndael; SAC’01, page 103, LNCS 2259, Springer.
-
SAC’01
, pp. 103
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
9
-
-
24144436510
-
Improved Cryptanalysis of Rijndael
-
Springer
-
Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, Doug Whiting: Improved Cryptanalysis of Rijndael, FSE 2000, Springer.
-
FSE 2000
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
10
-
-
0018530910
-
Structured design of substitution-permutation encryption networks;
-
J.B. Kam and G.I. Davida: Structured design of substitution-permutation encryption networks; IEEE Trans. on Computers, Vol. C-28, 1979, pp.747-753.
-
(1979)
IEEE Trans on Computers
, vol.28
, pp. 747-753
-
-
Kam, J.B.1
Davida, G.I.2
-
11
-
-
84949220397
-
On the Decorrelated Fast Cipher (DFC) and its Theory
-
Springer, LNCS 1636
-
Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and its Theory; FSE’99, Springer, LNCS 1636, pp. 81-94.
-
FSE’99
, pp. 81-94
-
-
Knudsen, L.R.1
Rijmen, V.2
-
12
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions;
-
April
-
Michael Luby, Charles W. Rackoff, How to construct pseudorandom permutations from pseudorandom functions;, SIAM Journal on Computing, vol. 17, n. 2, pp. 373-386, April 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.W.2
-
15
-
-
0003064824
-
On the construction of pseudo-random permutations: Luby-Rackoff revisited
-
Moni Naor and Omer Reingold: On the construction of pseudo-random permutations: Luby-Rackoff revisited; Journal of Cryptology, vol 12, 1999, pp. 29-66.
-
(1999)
Journal of Cryptology
, vol.12
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
16
-
-
84962968104
-
Differentially Uniform Mappings for Cryptography
-
LNCS 765, Springer
-
Kaisa Nyberg: Differentially Uniform Mappings for Cryptography; Eurocrypt’93, LNCS 765, Springer, pp. 55-64.
-
Eurocrypt’93
, pp. 55-64
-
-
Nyberg, K.1
-
17
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88
-
Springer-Verlag
-
Jacques Patarin: Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88; Crypto’95, Springer-Verlag, pp. 248-261.
-
Crypto’95
, pp. 248-261
-
-
Patarin, J.1
-
18
-
-
84946837966
-
Generic Attacks on Feistel Schemes;
-
LNCS 2248, Springer
-
Jacques Patarin: Generic Attacks on Feistel Schemes; Asiacrypt 2001, LNCS 2248, Springer, pp. 222-238.
-
Asiacrypt 2001
, pp. 222-238
-
-
Patarin, J.1
-
19
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two new families of Asymmetric Algorithms
-
Springer Verlag
-
Jacques Patarin: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms; in Eurocrypt’96, Springer Verlag, pp. 33-48.
-
Eurocrypt’96
, pp. 33-48
-
-
Patarin, J.1
-
21
-
-
84945121465
-
Structural Cryptanalysis of SASAS
-
LNCS 2045, Springer
-
Adi Shamir, Alex Biryukov: Structural Cryptanalysis of SASAS; Eurocrypt 2001, LNCS 2045, Springer, pp. 394-405.
-
Eurocrypt 2001
, pp. 394-405
-
-
Shamir, A.1
Biryukov, A.2
-
23
-
-
0037681368
-
Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations
-
LNCS1807, Springer
-
Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov, Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt’2000, LNCS 1807, Springer, pp. 392-407.
-
Eurocrypt’2000
, pp. 392-407
-
-
Shamir, A.1
Patarin, J.2
Courtois, N.3
Klimov, A.4
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
see inpatricular
-
Claude Elwood Shannon: Communication theory of secrecy systems;, Bell System Technical Journal 28 (1949), see in patricular page 704.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 704
-
-
Shannon, C.E.1
-
27
-
-
84937409797
-
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
-
LNCS 1976, Springer
-
Serge Vaudenay, Shiho Moriai: On the Pseudorandomness of Top-Level Schemes of Block Ciphers; Asiacrypt 2000, LNCS 1976, Springer, pp. 289-302.
-
Asiacrypt 2000
, pp. 289-302
-
-
Vaudenay, S.1
Moriai, S.2
|