-
1
-
-
84948955781
-
On Matsui’s Linear Cryptanalysis
-
Lecture Notes in Computer Science 950
-
Biham Eli, On Matsui’s Linear Cryptanalysis, Advances in Cryptology, proceedings of EUROCRYPT’94, Lecture Notes in Computer Science 950, pp. 341–355, 1994.
-
(1994)
Advances in Cryptology, Proceedings of EUROCRYPT’94
, pp. 341-355
-
-
Eli, B.1
-
3
-
-
84957694360
-
Miss in the Middle Attacks on IDEA and Khufu
-
Eli Biham, Alex Biryukov, Adi Shamir, Miss in the Middle Attacks on IDEA and Khufu, proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636, pp. 124–138, 1999.
-
(1999)
Proceedings of Fast Software Encryption 6, Lecture Notes in Computer Science 1636
, pp. 124-138
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
4
-
-
84957634424
-
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
-
Eli Biham, Alex Biryukov, Adi Shamir, Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Advances in Cryptology, proceedings of EUROCRYPT’99, Lecture Notes in Computer Science 1592, pp. 12–23, 1999.
-
(1999)
Advances in Cryptology, Proceedings of EUROCRYPT’99, Lecture Notes in Computer Science 1592
, pp. 12-23
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
5
-
-
84957692171
-
From Differential Cryptoanalysis to Ciphertext-Only Attacks
-
Lecture Notes in Computer Science 1462
-
Alex Biryukov, Eyal Kushilevitz, From Differential Cryptoanalysis to Ciphertext-Only Attacks, Advances in Cryptology, proceedings of CRYPTO’98, Lecture Notes in Computer Science 1462, pp. 72–88, 1998.
-
(1998)
Advances in Cryptology, Proceedings of CRYPTO’98
, pp. 72-88
-
-
Biryukov, A.1
Kushilevitz, E.2
-
6
-
-
84957369098
-
Two Attacks on Reduced Round IDEA
-
Lecture Notes in Computer Science 1233
-
Johan Borst, Lars R. Knudsen, Vincent Rijmen, Two Attacks on Reduced Round IDEA, Advances in Cryptology, proceedings of EUROCRYPT’97, Lecture Notes in Computer Science 1233, pp. 1–13, 1997.
-
(1997)
Advances in Cryptology, Proceedings of EUROCRYPT’97
, pp. 1-13
-
-
Borst, J.1
Knudsen, L.R.2
Rijmen, V.3
-
7
-
-
84957688406
-
Differential-Linear Weak Keys Classes of IDEA
-
Lecture Notes in Computer Science 1403
-
Philip Hawkes, Differential-Linear Weak Keys Classes of IDEA, Advances in Cryptology, proceedings if EUROCRYPT’98, Lecture Notes in Computer Science 1403, pp. 112-126, 1998.
-
(1998)
Advances in Cryptology, Proceedings If EUROCRYPT’98
, pp. 112-126
-
-
Hawkes, P.1
-
8
-
-
84974667019
-
A Chosen-Plaintext Linear Attack on DES
-
Lecture Notes in Computer Science 1978
-
Lars R. Knudsen, John Erik Mathiassen, A Chosen-Plaintext Linear Attack on DES, proceedings of Fast Software Encryption 7, Lecture Notes in Computer Science 1978, pp. 262–272, 2001.
-
(2001)
Proceedings of Fast Software Encryption 7
, pp. 262-272
-
-
Knudsen, L.R.1
Mathiassen, J.E.2
-
9
-
-
85028910917
-
Markov Ciphers and Differential Cryptanalysis
-
Lecture Notes in Computer Science 547
-
Xuejia Lai, James L. Massey, Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology, proceedings if EUROCRYPT’91, Lecture Notes in Computer Science 547, pp. 17-38, 1992.
-
(1992)
Advances in Cryptology, Proceedings If EUROCRYPT’91
, pp. 17-38
-
-
Lai, X.1
Massey, J.L.2
-
10
-
-
1642575733
-
Differential-Linear Cryptanalysis
-
Lecture Notes in Computer Science 839
-
Suzan K. Langford, Martin E. Hellman, Differential-Linear Cryptanalysis, Advances in Cryptology, proceedings of CRYPTO’94, Lecture Notes in Computer Science 839, pp. 17–25, 1994.
-
(1994)
Advances in Cryptology, Proceedings of CRYPTO’94
, pp. 17-25
-
-
Langford, S.K.1
Hellman, M.E.2
-
11
-
-
85025704284
-
Linear Cryptanalysis Method for DES Cipher
-
Lecture Notes in Computer Science 765
-
Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology, proceedings of EUROCRYPT’93, Lecture Notes in Computer Science 765, pp. 386–397, 1994.
-
(1994)
Advances in Cryptology, Proceedings of EUROCRYPT’93
, pp. 386-397
-
-
Matsui, M.1
-
12
-
-
0003508568
-
-
US National Bureau of Standards, Federal Information ProcessingStandards Publications No. 46
-
US National Bureau of Standards, Data Encryption Standard, Federal Information ProcessingStandards Publications No. 46, 1977.
-
(1977)
Data Encryption Standard
-
-
-
14
-
-
78649840429
-
Provable Security for Block Ciphers by Decorrelation
-
Lecture Notes in Computer Science 1373
-
Serge Vaudenay, Provable Security for Block Ciphers by Decorrelation, proceedings of STACS’98, Lecture Notes in Computer Science 1373, pp. 249–275, 1998.
-
(1998)
Proceedings of STACS’98
, pp. 249-275
-
-
Vaudenay, S.1
|