-
2
-
-
38549108774
-
On the SAFER cryptosystem
-
M. Darnell, Ed., Springer-Verlag
-
Brincat, K., Meijer, A., “On the SAFER cryptosystem,” Cryptography and Coding, Proceedings of 6th IMA Conference, LNCS 1355, M. Darnell, Ed., Springer-Verlag, 1997, 59-68.
-
(1997)
Cryptography and Coding, Proceedings of 6Th IMA Conference, LNCS 1355
, pp. 59-68
-
-
Brincat, K.1
Meijer, A.2
-
3
-
-
0006531820
-
Cryptanalysis of Iterated Block Ciphers
-
J.L. Massey, Ed., Hartung-Gorre Verlag, Konstanz
-
C. Harpes, “Cryptanalysis of Iterated Block Ciphers,” ETH series in Information Processing, J.L. Massey, Ed., Vol. 7, Hartung-Gorre Verlag, Konstanz, 1996.
-
(1996)
ETH Series in Information Processing
, vol.7
-
-
Harpes, C.1
-
4
-
-
84957664477
-
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma
-
L.C. Guillou and J.-J. Quisquater, Eds., Springer-Verlag
-
C. Harpes, G. Kramer, J.L. Massey, “A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma,” Advances in Cryptology, Procee-dings Eurocrypt'95, LNCS 921, L.C. Guillou and J.-J. Quisquater, Eds., Springer-Verlag, 1995, 24-38.
-
(1995)
Advances in Cryptology, Procee-Dings Eurocrypt'95, LNCS 921
, pp. 24-38
-
-
Harpes, C.1
Kramer, G.2
Massey, J.L.3
-
5
-
-
84945126868
-
The boomerang attack
-
L.R. Knudsen, Ed., Springer-Verlag
-
D. Wagner, “The boomerang attack,” Fast Software Encryption, LNCS 1636, L.R. Knudsen, Ed., Springer-Verlag, 1999, 201-214.
-
(1999)
Fast Software Encryption, LNCS 1636
, pp. 201-214
-
-
Wagner, D.1
-
7
-
-
38549131070
-
Improved truncated differential attacks on SAFER
-
K. Ohta, D. Pei, Eds., Springer-Verlag
-
H. Wu, F. Bao, R.H. Deng, Q.-Z. Ye, “Improved truncated differential attacks on SAFER,” Advances in Cryptology, Proceedings Asiacrypt'98, LNCS 1514, K. Ohta, D. Pei, Eds., Springer-Verlag, 1998, 133-147.
-
(1998)
Advances in Cryptology, Proceedings Asiacrypt'98, LNCS 1514
, pp. 133-147
-
-
Wu, H.1
Bao, F.2
Deng, R.H.3
Ye, Q.-Z.4
-
8
-
-
84957695618
-
Linear Cryptanalysis of RC5 and RC6
-
L.R. Knudsen, Ed., Springer-Verlag
-
J. Borst, B. Preneel, J. Vandewalle, “Linear Cryptanalysis of RC5 and RC6,” Fast Software Encryption, LNCS 1636, L.R. Knudsen, Ed., Springer-Verlag, 1999, 16-30.
-
(1999)
Fast Software Encryption, LNCS 1636
, pp. 16-30
-
-
Borst, J.1
Preneel, B.2
Vandewalle, J.3
-
9
-
-
0041107671
-
Key schedule weaknesses in SAFER+
-
March, Rome (I), 155-167
-
J. Kelsey, B. Schneier, D. Wagner, “Key schedule weaknesses in SAFER+,” Pro- ceedings 2nd Advanced Encryption Standard Candidate Conference, March 22-23, 1999, Rome (I), 155-167.
-
(1999)
Pro- Ceedings 2Nd Advanced Encryption Standard Candidate Conference
, pp. 22-23
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
11
-
-
85019318892
-
SAFER-K64: A byte-oriented block ciphering algorithm
-
D. Gollmann, Ed., Springer-Verlag
-
J.L. Massey, “SAFER-K64: a byte-oriented block ciphering algorithm,” Fast Soft- ware Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, 1-17.
-
(1996)
Fast Soft- Ware Encryption, LNCS 1039
, pp. 1-17
-
-
Massey, J.L.1
-
12
-
-
84948973315
-
SAFER-K64: One year later
-
B. Preneel, Ed., Springer-Verlag
-
J.L. Massey, “SAFER-K64: one year later,” Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, 212-241.
-
(1995)
Fast Software Encryption, LNCS 1008
, pp. 212-241
-
-
Massey, J.L.1
-
13
-
-
84974685452
-
Strengthened key schedule for the cipher SAFER
-
September
-
J L. Massey, “Strengthened key schedule for the cipher SAFER,” posted to the USENET newsgroup sci.crypt, September 1995. Available at ftp://ftp.cert.dfn.de/pub/tools/crypt/SAFER/
-
(1995)
Posted to the USENET Newsgroup Sci.Crypt
-
-
Massey, J.L.1
-
14
-
-
84948991282
-
Linear approximation of block ciphers
-
A. De Santis, Ed., Springer-Verlag
-
K. Nyberg, “Linear approximation of block ciphers,” Advances in Cryptology, Proceedings Eurocrypt'94, LNCS 950, A. De Santis, Ed., Springer-Verlag, 1995, 439-444.
-
(1995)
Advances in Cryptology, Proceedings Eurocrypt'94, LNCS 950
, pp. 439-444
-
-
Nyberg, K.1
-
15
-
-
84949229156
-
A key schedule weakness in SAFER-K64
-
D. Coppersmith, Ed., Springer-Verlag
-
L.R. Knudsen, “A key schedule weakness in SAFER-K64,” Advances in Cryp- tology, Proceedings Crypto'95, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, 274-286.
-
(1995)
Advances in Cryp- Tology, Proceedings Crypto'95, LNCS 963
, pp. 274-286
-
-
Knudsen, L.R.1
-
16
-
-
84974663725
-
Why SAFER K changed its name
-
Paris, France, April
-
L R. Knudsen, “Why SAFER K changed its name,” Technical Report LIENS 96-13, Laboratoire d’Informatique, Ecole Normale Supérieure, Paris, France, April 1996. Available at http://www.ii.uib.no/~larsr/aes.html
-
(1996)
Technical Report LIENS 96-13, Laboratoire d’Informatique, Ecole Normale Supérieure
-
-
Knudsen, L.R.1
-
17
-
-
84958958039
-
Truncated differentials of SAFER
-
D. Gollmann, Ed., Springer-Verlag
-
L.R. Knudsen, T.A. Berson, “Truncated differentials of SAFER,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, 15-26.
-
(1996)
Fast Software Encryption, LNCS 1039
, pp. 15-26
-
-
Knudsen, L.R.1
Berson, T.A.2
-
18
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
T. Helleseth, Ed., Springer-Verlag
-
M. Matsui, “Linear cryptanalysis method for DES cipher,” Advances in Cryp- tology, Proceedings Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, 386-397.
-
(1994)
Advances in Cryp- Tology, Proceedings Eurocrypt'93, LNCS 765
, pp. 386-397
-
-
Matsui, M.1
-
19
-
-
33747285760
-
A new method for known plaintext attack on FEAL cipher
-
R.A. Ruep-pel, Ed., Springer-Verlag
-
M. Matsui, A. Yamagishi, “A new method for known plaintext attack on FEAL cipher,” Advances in Cryptology, Proceedings Eurocrypt'92, LNCS 658, R.A. Ruep-pel, Ed., Springer-Verlag, 1993, 81-91.
-
(1993)
Advances in Cryptology, Proceedings Eurocrypt'92, LNCS 658
, pp. 81-91
-
-
Matsui, M.1
Yamagishi, A.2
-
20
-
-
33746002680
-
An analysis of SAFER
-
S. Murphy, “An analysis of SAFER,” Journal of Cryptology, Vol. 11, No. 4, 1998, 235-251.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.4
, pp. 235-251
-
-
Murphy, S.1
-
21
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
D. Gollmann, Ed., Springer- Verlag
-
S. Vaudenay, “On the need for multipermutations: Cryptanalysis of MD4 and SAFER,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer- Verlag, 1996, 286-297
-
(1996)
Fast Software Encryption, LNCS 1039
, pp. 286-297
-
-
Vaudenay, S.1
|