Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES
暂无分享,去创建一个
[1] Jason Gait,et al. Report of the Workshop on Cryptography in Support of Computer Security , 1977 .
[2] Ingrid Schaumüller-Bichl,et al. Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding , 1982, EUROCRYPT.
[3] Joos Vandewalle,et al. Analytical Characteristics of the DES , 1983, CRYPTO.
[4] Masayuki Noro,et al. Risa/Asir—a computer algebra system , 1992, ISSAC '92.
[5] Peter C. Wayner,et al. Content-Addressable Search Engines and DES-like Systems , 1992, CRYPTO.
[6] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[7] Susan K. Langford,et al. Differential-Linear Cryptanalysis , 1994, CRYPTO.
[8] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[9] Matthew J. B. Robshaw,et al. Linear Cryptanalysis Using Multiple Approximations , 1994, CRYPTO.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[11] 임종인,et al. Gröbner Bases와 응용 , 1995 .
[12] Matthew J. B. Robshaw,et al. Non-Linear Approximations in Linear Cryptanalysis , 1996, EUROCRYPT.
[13] Shiho Moriai,et al. Improved fast software implementation of block ciphers , 1997, ICICS.
[14] Eli Biham,et al. A Fast New DES Implementation in Software , 1997, FSE.
[15] Toshinobu Kaneko,et al. Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security) , 1998 .