On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
暂无分享,去创建一个
[1] H. Feistel. Cryptography and Computer Privacy , 1973 .
[2] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[3] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[4] Ralph Howard,et al. Data encryption standard , 1987 .
[5] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[6] Hideki Imai,et al. On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses , 1989, CRYPTO.
[7] Hideki Imai,et al. Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract) , 1989, EUROCRYPT.
[8] Josef Pieprzyk,et al. How to Construct Pseudorandom Permutations from Single Pseudorandom Functions , 1991, EUROCRYPT.
[9] Yuliang Zheng. Principles for Designing Secure Block Ciphers and One-Way Hash Functions , 1990 .
[10] Babak Sadeghiyan,et al. A Construction for Super Pseudorandom Permutations from A Single Pseudorandom Function , 1992, EUROCRYPT.
[11] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[12] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[13] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[14] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[15] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[16] Lars R. Knudsen,et al. Provable Security Against a Differential Attack , 1994 .
[17] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[18] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[19] Kaisa Nyberg,et al. Linear Approximation of Block Ciphers , 1994, EUROCRYPT.
[20] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[21] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[22] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[23] Mitsuru Matsui,et al. New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis , 1996, FSE.