메뉴 건너뛰기




Volumn 2355, Issue , 2002, Pages 233-247

Round security and super-pseudorandomness of MISTY type structure

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84958961922     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45473-X_20     Document Type: Conference Paper
Times cited : (17)

References (14)
  • 1
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J.L. Carter and M.N. Wegman. Universal classes of hash functions. JCSS, vol. 18, No. 2, pages 143–154, 1979.
    • (1979) JCSS , vol.18 , Issue.2 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 2
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • April
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, No. 2, pages 373–386, April 1988.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 3
    • 51849100070 scopus 로고    scopus 로고
    • Faster Luby-Rackoff ciphers
    • LNCS, 1039, Springer-Verlag
    • S. Lucks. Faster Luby-Rackoff ciphers. Fast Software Encryption, FSE’96, LNCS 1039, pages 189–203, Springer-Verlag.
    • Fast Software Encryption, FSE’96 , pp. 189-203
    • Lucks, S.1
  • 4
    • 35048878011 scopus 로고    scopus 로고
    • New structure of block ciphers with provable security against differential and linear cryptanalysis
    • LNCS, 1039, Springer-Verlag
    • M. Matsui. New structure of block ciphers with provable security against differential and linear cryptanalysis. Fast Software Encryption, FSE’96, LNCS 1039, pages 206–218, Springer-Verlag.
    • Fast Software Encryption, FSE’96 , pp. 206-218
    • Matsui, M.1
  • 5
    • 84947904428 scopus 로고    scopus 로고
    • New block encryption algorithm MISTY
    • LNCS, 1267, Springer-Verlag
    • M. Matsui. New block encryption algorithm MISTY. Fast Software Encryption, FSE’97, LNCS 1267, pages 54–68, Springer-Verlag.
    • Fast Software Encryption, FSE’97 , pp. 54-68
    • Matsui, M.1
  • 6
    • 0003064824 scopus 로고    scopus 로고
    • On the construction of pseudorandom permutations: Luby-Rackoff revised
    • Springer-Verlag
    • M. Naor and O. Reingold. On the construction of pseudorandom permutations: Luby-Rackoff revised. J. Cryptology, vol. 12, No. 1, pages 29–66, Springer-Verlag, 1999.
    • (1999) J. Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 7
    • 0029632010 scopus 로고
    • Provable security against a differential attacks
    • Springer-Verlag
    • K. Nyberg and L.R. Knudsen. Provable security against a differential attacks. J. Cryptology, vol. 8, No. 1, pages 27–37, Springer-Verlag, 1995.
    • (1995) J. Cryptology , vol.8 , Issue.1 , pp. 27-37
    • Nyberg, K.1    Knudsen, L.R.2
  • 8
    • 0012077520 scopus 로고
    • Pseudorandom permutations based on the DES scheme
    • LNCS 514, Springer-Verlag
    • J. Patarin. Pseudorandom permutations based on the DES scheme. Proceedings of Eurocode’90, LNCS 514, pages 193–204, Springer-Verlag, 1990.
    • (1990) Proceedings of Eurocode’90 , pp. 193-204
    • Patarin, J.1
  • 9
    • 85029478073 scopus 로고
    • New results of pseudorandom permutation generators based on the DES scheme
    • LNCS, 576, Springer-Verlag
    • J. atarin. New results of pseudorandom permutation generators based on the DES scheme. Advances in Cryptology — CRYPTO’91, LNCS 576, pages 301–312, Springer-Verlag, 1991.
    • (1991) Advances in Cryptology — CRYPTO’91 , pp. 301-312
    • Atarin, J.1
  • 10
    • 84974573774 scopus 로고    scopus 로고
    • On the round security of symmetric-key cryptographic primitives
    • LNCS, 1880, Springer-Verlag
    • Z. Ramzan and L. Reyzin. On the round security of symmetric-key cryptographic primitives. Advances in Cryptology — CRYPTO 2000, LNCS 1880, pages 376–393, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology — CRYPTO 2000 , pp. 376-393
    • Ramzan, Z.1    Reyzin, L.2
  • 11
    • 0030686751 scopus 로고    scopus 로고
    • On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis
    • April
    • K. Sakurai and Y. Zheng. On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis. IEICE Trans. fundamentals, vol. E80-A, No. 1, pages 19–24, April 1997.
    • (1997) IEICE Trans. Fundamentals , vol.80 , Issue.1 , pp. 19-24
    • Sakurai, K.1    Zheng, Y.2
  • 12
    • 0012022898 scopus 로고    scopus 로고
    • Pseudorandomness of a block cipher MISTY
    • ISEC 96-9
    • M. Sugita. Pseudorandomness of a block cipher MISTY. Technicalr eport of IEICE, ISEC 96-9, pages 13–21, 1996.
    • (1996) Technicalr Eport of IEICE , pp. 13-21
    • Sugita, M.1
  • 13
    • 85027103665 scopus 로고    scopus 로고
    • Pseudorandomness of block ciphers MISTY1
    • ISEC 97-19
    • M. Sugita. Pseudorandomness of block ciphers MISTY1. Technicalr eport of IEICE, ISEC 97-19, pages 53–64, 1997.
    • (1997) Technicalr Eport of IEICE , pp. 53-64
    • Sugita, M.1
  • 14
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman and J.L. Carter. New hash functions and their use in authentication and set equality. JCSS, vol. 22, No. 3, pages 265–279, 1981.
    • (1981) JCSS , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.