-
1
-
-
84947444236
-
“The Block Cipher Square
-
LNCS 1267, E. Biham, Ed., Springer-Verlag
-
J. Daemen, L.R. Knudsen, V. Rijmen, “The Block Cipher Square,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 149–165.
-
(1997)
Fast Software Encryption
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.R.2
Rijmen, V.3
-
2
-
-
84957702273
-
“Attack on Six Rounds of Crypton
-
LNCS 1636, L. Knudsen, Ed., Springer-Verlag
-
C. D’Halluin, G. Bijnens, V. Rijmen, B. Preneel, “Attack on Six Rounds of Crypton,” Fast Software Encryption, LNCS 1636, L. Knudsen, Ed., Springer-Verlag, 1999, pp. 46–59.
-
(1999)
Fast Software Encryption
, pp. 46-59
-
-
D’Halluin, C.1
Bijnens, G.2
Rijmen, V.3
Preneel, B.4
-
4
-
-
24144436510
-
Improved Cryptanalysis of Rijndael
-
to appear in, Springer-Verlag
-
N. Ferguson, J. Kelsey, S. Lucks, B. Schneier, M. Stay, D. Wagner, and D. Whiting, “Improved Cryptanalysis of Rijndael,” to appear in Fast Software Encryption’00, Springer-Verlag.
-
Fast Software Encryption’00
-
-
Ferguson, N.1
Kelsey, J.2
Lucks, S.3
Schneier, B.4
Stay, M.5
Wagner, D.6
Whiting, D.7
-
5
-
-
12444346059
-
A Collision Attack on Seven Rounds of
-
NIST, April
-
H. Gilbert, M. Minier, “A Collision Attack on Seven Rounds of Rijndael,” Third Advanced Encryption Standard Candidate Conference, NIST, April 2000, pp. 230–241.
-
(2000)
Third Advanced Encryption Standard Candidate Conference
, pp. 230-241
-
-
Gilbert, H.1
Minier, M.2
-
8
-
-
84958992663
-
-
NESSIE Project – New European Schemes for Signatures, Integrity and Encryption
-
NESSIE Project – New European Schemes for Signatures, Integrity and Encryption – http://cryptonessie.org.
-
-
-
-
9
-
-
4344657952
-
“Cryptanalysis and Design of Iterated Block Ciphers
-
October, K.U.Leuven
-
V. Rijmen, “Cryptanalysis and Design of Iterated Block Ciphers,” Doctoral Dissertation, October 1997, K.U.Leuven.
-
(1997)
Doctoral Dissertation
-
-
Rijmen, V.1
-
10
-
-
84958979426
-
“The Cipher SHARK
-
LNCS 1039, D. Gollmann, Ed., Springer-Verlag
-
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, “The Cipher SHARK,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 99-112
-
(1996)
Fast Software Encryption
, pp. 99-112
-
-
Rijmen, V.1
Daemen, J.2
Preneel, B.3
Bosselaers, A.4
De Win, E.5
-
11
-
-
84958992664
-
-
Toshiba Corporation, September 25
-
Toshiba Corporation, “Security Evaluation: Hierocrypt-3,” September 25, 2000 – available at http://cryptonessie.org.
-
(2000)
Ecurity Evaluation
-
-
-
12
-
-
84958992665
-
-
Toshiba Corporation, September 25
-
Toshiba Corporation, “Security Evaluation: Hierocrypt-L1,” September 25, 2000 – available at http://cryptonessie.org.
-
(2000)
Security Evaluation
-
-
-
13
-
-
84958992666
-
-
Toshiba Corporation, submitted to the First Open NESSIE Workshop, 13-14 November, Leuven, Belgium
-
Toshiba Corporation, “Specification of Hierocrypt-3,” submitted to the First Open NESSIE Workshop, 13-14 November 2000, Leuven, Belgium – available at http://cryptonessie.org.
-
(2000)
“Specification of Hierocrypt-3
-
-
-
14
-
-
84958992667
-
-
Toshiba Corporation, submitted to the First Open NESSIE Workshop, 13-14 November, Leuven, Belgium
-
Toshiba Corporation, “Specification of Hierocrypt-L1,” submitted to the First Open NESSIE Workshop, 13-14 November 2000, Leuven, Belgium – available at http://cryptonessie.org.
-
(2000)
“Specification of Hierocrypt-L1
-
-
-
15
-
-
84958992668
-
-
Toshiba Corporation, Toshiba Corporation, Sep. 15, 2000 – submitted to the First Open NESSIE Workshop, 13-14 November, Leuven, Belgium
-
Toshiba Corporation, “Specification on a Block Cipher: Hierocrypt-3,” Toshiba Corporation, Sep. 15, 2000 – submitted to the First Open NESSIE Workshop, 13-14 November 2000, Leuven, Belgium – available at http://cryptonessie.org.
-
(2000)
“Specification on a Block Cipher: Hierocrypt-3
-
-
|