The Return of the Boomerang
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[2] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[3] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[4] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[5] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[6] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[7] Ralph Howard,et al. Data encryption standard , 1987 .
[8] Wen-Ai Jackson,et al. Projective aspects of the AES inversion , 2007, Des. Codes Cryptogr..
[9] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[10] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[11] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[12] Sean Murphy,et al. Likelihood Estimation for Block Cipher Keys , 2006 .