Improved Slide Attacks
暂无分享,去创建一个
[1] Seokhie Hong,et al. Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST , 2004, FSE.
[2] Donald W. Davies,et al. The average Cycle size of the Key-Stream in Output Feedback Encipherment , 1982, EUROCRYPT.
[3] Soichi Furuya,et al. Slide Attacks with a Known-Plaintext Cryptanalysis , 2001, ICISC.
[4] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[5] Lars R. Knudsen,et al. Cryptanalysis of LOKI91 , 1992, AUSCRYPT.
[6] Gideon Yuval,et al. Reinventing the Travois: Encryption/MAC in 30 ROM Bytes , 1997, FSE.
[7] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[8] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[9] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[10] Eli Biham,et al. Miss in the Middle Attacks on IDEA and Khufu , 1999, FSE.
[11] Jennifer Seberry,et al. Key Scheduling In Des Type Cryptosystems , 1990, AUSCRYPT.
[12] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[13] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[14] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[15] Andrew Granville. Cycle Lengths in a Permutation are Typically Poisson , 2006, Electron. J. Comb..
[16] Toshinobu Kaneko,et al. Differential Cryptanalysis of Reduced Rounds of GOST , 2000, Selected Areas in Cryptography.
[17] Alex Biryukov,et al. Slide Attacks , 1999, FSE.
[18] Alex Biryukov,et al. Advanced Slide Attacks , 2000, EUROCRYPT.