Security analysis of the SCO-family using key schedules
暂无分享,去创建一个
[1] Nikolay A. Moldovyan,et al. New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..
[2] Seokhie Hong,et al. Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 , 2007, ACISP.
[3] Odysseas G. Koufopavlou,et al. High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers , 2005, Mob. Networks Appl..
[4] Seokhie Hong,et al. Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.
[5] Jongsung Kim,et al. Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 , 2005, IMACC.
[6] Jongsung Kim,et al. Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b , 2006, SCN.
[7] Nikolay A. Moldovyan,et al. Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.
[8] Jongsung Kim,et al. Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b , 2005, Mycrypt.
[9] Seokhie Hong,et al. Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.
[10] N.D. Goots,et al. Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[11] Nikolay A. Moldovyan,et al. A cipher based on data-dependent permutations , 2001, Journal of Cryptology.
[12] Nikolay A. Moldovyan. On Cipher Design Based on Switchable Controlled Operations , 2003, Int. J. Netw. Secur..
[13] Sangjin Lee,et al. A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.