-
1
-
-
84947904230
-
Foiling Birthday Attacks in Length-Doubling Transformations
-
LNCS 1070, Springer Verlag, Saragossa, Spain, May
-
W. Aiello, R. Venkatesan, “Foiling Birthday Attacks in Length-Doubling Transformations”. In Advances in Cryptology - Eurocrypt’96, LNCS 1070, p. 307, Springer Verlag, Saragossa, Spain, May 1996.
-
(1996)
Advances in Cryptology - Eurocrypt’96
, pp. 307
-
-
Aiello, W.1
Venkatesan, R.2
-
2
-
-
84983089516
-
The Security of Cipher Block Chaining
-
LNCS 839, Springer-Verlag, Santa Barbara, U.S.A
-
M. Bellare, J. Kilian, P. Rogaway, “The Security of Cipher Block Chaining”. In Advances in Cryptology - CRYPTO’94, LNCS 839, p. 341, Springer-Verlag, Santa Barbara, U.S.A., 1994.
-
(1994)
Advances in Cryptology - CRYPTO’94
, pp. 341
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
84959007862
-
-
Specification of the 3GPP confidentiality and Integrity algorithm KASUMI. Documentation available on
-
Specification of the 3GPP confidentiality and Integrity algorithm KASUMI. Documentation available on http://www.etsi.org/
-
-
-
-
4
-
-
84959007863
-
On Provable Security against Differential and Linear Cryptanalysis in Generalized Feistel Ciphers with Multiple Random Functions
-
Ottawa, Canada, August
-
Y. Kaneko, F. Sano, K. Sakurai, “On Provable Security against Differential and Linear Cryptanalysis in Generalized Feistel Ciphers with Multiple Random Functions”. In Selected Areas in Cryptography - SAC’97, Ottawa, Canada, August 1997.
-
(1997)
Selected Areas in Cryptography - SAC’97
-
-
Kaneko, Y.1
Sano, F.2
Sakurai, K.3
-
5
-
-
85011105685
-
A Proposal for a New Block Encryption Standard
-
LNCS 473, Springer Verlag, Aarhus, Denemark
-
X. Lai, J.L. Massey, “A Proposal for a New Block Encryption Standard”. In Advances in Cryptology - Eurocrypt’90, LNCS 473, p. 389, Springer Verlag, Aarhus, Denemark, 1991.
-
(1991)
Advances in Cryptology - Eurocrypt’90
, pp. 389
-
-
Lai, X.1
Massey, J.L.2
-
6
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Function
-
M. Luby, C. Rackoff, “How to Construct Pseudorandom Permutations from Pseudorandom Function”. In Siam Journal on Computing, vol. 17, p. 373, 1988.
-
(1988)
Siam Journal on Computing
, vol.17
, pp. 373
-
-
Luby, M.1
Rackoff, C.2
-
7
-
-
85048564026
-
A Simplified and generalised treatment of Luby-Rackoff Pseudorandom Permutation Generators
-
LNCS 658, Springer Verlag, New York, USA
-
U. Maurer, “A Simplified and generalised treatment of Luby-Rackoff Pseudorandom Permutation Generators”, In Advances in Cryptology - Eurocrypt’92, LNCS 658, p. 239, Springer Verlag, New York, USA, 1992.
-
(1992)
Advances in Cryptology - Eurocrypt’92
, pp. 239
-
-
Maurer, U.1
-
8
-
-
84947904428
-
New Block Encryption Algorithm MISTY
-
LNCS 1267, Springer Verlag, Haifa, Israel
-
M. Matsui, “New Block Encryption Algorithm MISTY”, In Fast Software Encryption - FSE’97, LNCS 1267, p. 54, Springer Verlag, Haifa, Israel, 1997.
-
(1997)
Fast Software Encryption - FSE’97
, pp. 54
-
-
Matsui, M.1
-
10
-
-
0030686751
-
On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
-
January
-
K. Sakurai, Y. Zheng, “On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis, In IEICE Trans. Fundamentals, vol. 80, n. 1, January 1997.
-
(1997)
IEICE Trans. Fundamentals
, vol.80
, Issue.1
-
-
Sakurai, K.1
Zheng, Y.2
-
13
-
-
84949262469
-
On Provable Security for Conventional Cryptography
-
invited lecture
-
S. Vaudenay, “On Provable Security for Conventional Cryptography”, In ICISC’99, invited lecture.
-
ICISC’99
-
-
Vaudenay, S.1
-
14
-
-
85032866581
-
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
-
LNCS 435, Springer-Verlag, Santa Barbara, U.S.A
-
Y. Zheng, T. Matsumoto, H. Imai, “On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses”. In Advances in Cryptology - CRYPTO’89, LNCS 435, p. 461, Springer-Verlag, Santa Barbara, U.S.A., 1990.
-
(1990)
Advances in Cryptology - CRYPTO’89
, pp. 461
-
-
Zheng, Y.1
Matsumoto, T.2
Imai, H.3
|