Improved Linear Cryptanalysis of Round-Reduced ARIA
暂无分享,去创建一个
[1] Alex Biryukov,et al. Progress in Cryptology -- INDOCRYPT 2015 , 2015, Lecture Notes in Computer Science.
[2] Shao-zhen Chen,et al. Biclique Attack of the Full ARIA-256 , 2012, IACR Cryptol. ePrint Arch..
[3] Vincent Rijmen,et al. Fast Software Encryption , 2002, Lecture Notes in Computer Science.
[4] Chae Hoon Lim,et al. Information Security and Cryptology — ICISC 2002 , 2003, Lecture Notes in Computer Science.
[5] Juanru Li,et al. Linear Cryptanalysis of ARIA Block Cipher , 2011, ICICS.
[6] Kaisa Nyberg,et al. Linear Approximation of Block Ciphers , 1994, EUROCRYPT.
[7] Daesung Kwon,et al. A Description of the ARIA Encryption Algorithm , 2010, RFC.
[8] Gaëtan Leurent,et al. Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning , 2016, EUROCRYPT.
[9] Hongbo Yu,et al. Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA , 2013, ISC.
[10] Jiazhe Chen,et al. Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds , 2010, CANS.
[11] Dengguo Feng,et al. Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia , 2007, Journal of Computer Science and Technology.
[12] Chao Li,et al. A meet-in-the-middle attack on reduced-round ARIA , 2011, J. Syst. Softw..
[13] Chunyan Song,et al. Improved Impossible Differential Cryptanalysis of ARIA , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[14] Chao Li,et al. Integral Cryptanalysis of ARIA , 2009, Inscrypt.
[15] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[16] Alex Biryukov,et al. Security and Performance Analysis of Aria Version 1 . 2 FINAL REPORT , 2004 .
[17] Stefan Lucks,et al. New Boomerang Attacks on ARIA , 2010, INDOCRYPT.
[18] Yanjun Li,et al. Integral Attacks on Reduced-Round ARIA Block Cipher , 2010, ISPEC.
[19] Ali Aydin Selçuk,et al. On Probability of Success in Linear and Differential Cryptanalysis , 2008, Journal of Cryptology.
[20] Nasour Bagheri,et al. Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 , 2015, INDOCRYPT.
[21] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[22] Mitsuru Matsui,et al. A New Method for Known Plaintext Attack of FEAL Cipher , 1992, EUROCRYPT.
[23] Peng Zhang,et al. New Impossible Differential Cryptanalysis of ARIA , 2008, IACR Cryptol. ePrint Arch..
[24] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[25] Daesung Kwon,et al. Addition of the ARIA Cipher Suites to Transport Layer Security (TLS) , 2011, RFC.