-
1
-
-
1842657318
-
-
Proc. of the 3rd symposium on State and Progress of Research in Cryptography, W. Wolfowicz, Ed.,Fondazione Ugo Bordoni
-
CM. Adams, S.E. Tavares, "Designing S-boxes for ciphers resistant to differential cryptanalysis," Proc. of the 3rd symposium on State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, 1993, pp. 181-190.
-
(1993)
Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis
, pp. 181-190
-
-
Adams, C.M.1
Tavares, S.E.2
-
2
-
-
0026397734
-
Differential cryptanalysis of DES-like cryptosys-tems
-
E. Biham and A. Shamir, "Differential cryptanalysis of DES-like cryptosys-tems," Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3-72.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1
, pp. 3-72
-
-
Biham, E.1
Shamir, A.2
-
3
-
-
0028428941
-
The data encryption standard (DES) and its strength against attacks
-
May
-
D. Coppersmith, "The data encryption standard (DES) and its strength against attacks," IBM Journal of Research and Developmental. 38, No. 3, May 1994, pp. 243-250.
-
(1994)
IBM Journal of Research and Developmental
, vol.38
, Issue.3
, pp. 243-250
-
-
Coppersmith, D.1
-
4
-
-
84958965747
-
-
Proc. of the 3rd Symposium on the State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, Roma
-
J. Daemen, R. Govaerts, J. Vandewalle, "Block ciphers based on modular arithmetic," Proc. of the 3rd Symposium on the State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, Roma, 1993, pp. 80-89.
-
(1993)
Block Ciphers Based on Modular Arithmetic
, pp. 80-89
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
5
-
-
85025673016
-
-
Advances in Cryptology, Proc. Grypto'93, LNCS 77S, D. Stinson, Ed., Springer-Verlag
-
J. Daemen, R. Govaerts, J. Vandewalle, "Weak keys of IDEA," Advances in Cryptology, Proc. Grypto'93, LNCS 77S, D. Stinson, Ed., Springer-Verlag, 1994, pp. 224-231.
-
(1994)
Weak Keys of IDEA
, pp. 224-231
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
6
-
-
85026894824
-
-
Fast Software Encryption, LNCS 809,R. Anderson, Ed., Springer-Verlag
-
J. Daemen, R. Govaerts, J. Vandewalle, "A new approach to block cipher design," Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 18-32.
-
(1994)
"A New Approach to Block Cipher Design
, pp. 18-32
-
-
Daemen, J.1
Govaerts, R.2
Vandewalle, J.3
-
8
-
-
84959025383
-
-
Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag
-
K.U. Leuven, M.H. Dawson, S.E. Tavares, "An expanded set of S-box design criteria based on information theory," Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 352-367.
-
(1991)
An Expanded Set of S-Box Design Criteria Based on Information Theory
, pp. 352-367
-
-
Leuven, K.U.1
Dawson, M.H.2
Tavares, S.E.3
-
9
-
-
0001820140
-
Cryptography and computer privacy
-
H. Feistel, "Cryptography and computer privacy," Scientific American, Vol. 228, No. 5, May 1973, pp. 15-23.
-
(1973)
Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
10
-
-
0016579870
-
Some cryptographic techniques for machine-to-machine data communications
-
November
-
H. Feistel, W.A. Notz, J.L. Smith, "Some cryptographic techniques for machine-to-machine data communications," Proc. IEEE, Vol. 63, No. 11, November 1975, pp. 1543-1554.
-
(1975)
Proc. IEEE
, vol.63
, Issue.11
, pp. 1543-1554
-
-
Feistel, H.1
Notz, W.A.2
Smith, J.L.3
-
11
-
-
33645492588
-
-
Data Encryption Standard, Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January
-
Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.
-
(1977)
Federal Information Processing Standard (FIPS)
-
-
-
13
-
-
0346858443
-
-
Advances in Cryptology, Proc. Crypto'90, LNCS 537, S. Vanstone, Ed., Springer-Verlag
-
K. Kim, T. Matsumoto, H. Imai, "A recursive construction method of S-boxes satisfying strict avalanche criterion," Advances in Cryptology, Proc. Crypto'90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 564-575.
-
(1991)
A Recursive Construction Method of S-Boxes Satisfying Strict Avalanche Criterion
, pp. 564-575
-
-
Kim, K.1
Matsumoto, T.2
Imai, H.3
-
14
-
-
84948949623
-
-
Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag
-
L.R. Knudsen, "Truncated and higher order differentials," Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 196-211.
-
(1995)
Truncated and Higher Order Differentials
, pp. 196-211
-
-
Knudsen, L.R.1
-
16
-
-
1642575733
-
-
Advances in Cryptology, Proc. Crypto'94, LNCS 839, Y.Desmedt, Ed., Springer-Verlag
-
S.K. Langford, M.E. Hellman, "Differential-linear cryptanalysis," Advances in Cryptology, Proc. Crypto'94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, 1994, pp. 17-25.
-
(1994)
"Differential-Linear Cryptanalysis
, pp. 17-25
-
-
Langford, S.K.1
Hellman, M.E.2
-
18
-
-
85019318892
-
-
Fast Software Encryption, LNCS 809, R. Anderson, Ed.,Springer-Verlag
-
J. Massey, "SAFER K-64: a byte-oriented block-ciphering algorithm," Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 1-17.
-
(1994)
"SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
, pp. 1-17
-
-
Massey, J.1
-
19
-
-
84948973315
-
-
Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag
-
J. Massey, "SAFER K-64: One year later," Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 212-241.
-
(1995)
SAFER K-64: One Year Later
, pp. 212-241
-
-
Massey, J.1
-
20
-
-
85025704284
-
-
Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T.Helleseth, Ed., Springer-Verlag
-
M. Matsui, "Linear cryptanalysis method for DES cipher," Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386-397.
-
(1994)
"Linear Cryptanalysis Method for DES Cipher
, pp. 386-397
-
-
Matsui, M.1
-
21
-
-
85030461165
-
-
Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W.Davies, Ed., Springer-Verlag
-
K. Nybesg, "Perfect nonlinear S-boxes," Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 378-386.
-
(1991)
Perfect Nonlinear S-Boxes
, pp. 378-386
-
-
Nybesg, K.1
-
22
-
-
84962968104
-
-
Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T.Helleseth, Ed., Springer-Verlag
-
K. Nyberg, "Differentially uniform mappings for cryptography," Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 55-64.aa
-
(1994)
Differentially Uniform Mappings for Cryptography
, pp. 55-64
-
-
Nyberg, K.1
-
23
-
-
84949023413
-
-
Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag
-
L. O'Connor, "On the distribution of characteristics inbijective mappings," Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 360-370.
-
(1994)
"On the Distribution of Characteristics Inbijective Mappings
, pp. 360-370
-
-
O'connor, L.1
-
25
-
-
1842707451
-
On weaknesses of non-surjective round functions
-
V. Rijmen, B. Preneel, "On weaknesses of non-surjective round functions," Workshop on Selected Areas in Cryptography - SAC'95, Ottawa, May 1819, 1995, pp. 100-106.
-
(1995)
Workshop on Selected Areas in Cryptography - SAC'95, Ottawa, May
, vol.1819
, pp. 100-106
-
-
Rijmen, V.1
Preneel, B.2
-
26
-
-
84953635000
-
-
Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag
-
B. Schneier, "Description of a new variable-length key, 64-bit block cipher (Blowfish)," Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 191-204.
-
(1994)
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)
, pp. 191-204
-
-
Schneier, B.1
-
27
-
-
84958983165
-
-
Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag
-
B. Schneier, M. Blaze, "MacGuffin: an unbalanced Feistel network block cipher," Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 97-110.
-
(1995)
"Macguffin: An Unbalanced Feistel Network Block Cipher
, pp. 97-110
-
-
Schneier, B.1
Blaze, M.2
|