A Universal Encryption Standard
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude , 1996, CRYPTO.
[2] Eli Biham,et al. Cryptanalysis of Multiple Modes of Operation , 1994, Journal of Cryptology.
[3] Eli Biham,et al. Cryptanalysis of the ANSI X9.52 CBCM mode , 2001, Journal of Cryptology.
[4] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[5] Eli Biham. Cryptanalysis of Triple Modes of Operation , 1999, Journal of Cryptology.
[6] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[7] Bart Preneel,et al. On the Security of Double and 2-Key Triple Modes of Operation , 1999, FSE.
[8] Stefan Lucks. On Security of the 128-Bit Block Cipher DEAL , 1999, FSE.
[9] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[10] Stefan Lucks,et al. Attacking Triple Encryption , 1998, FSE.
[11] Bruce Schneier,et al. Key-Schedule Cryptanalysis of DEAL , 1999, Selected Areas in Cryptography.
[12] G. E. Thyer,et al. Modes of operation , 1991 .
[13] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[14] Ralph Howard,et al. Data encryption standard , 1987 .
[15] John Gilmore,et al. Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .
[16] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[17] Lars R. Knudsen,et al. Block Ciphers: Analysis, Design and Applications , 1994 .
[18] Matthew J. Weiner,et al. Efficient DES Key Search , 1994 .
[19] David A. Wagner. Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation , 1998, FSE.
[20] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[21] Eli Biham,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .