Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN
暂无分享,去创建一个
Donghoon Chang | Abhishek Kumar | Somitra Kumar Sanadhya | D. Chang | S. K. Sanadhya | Abhishek Kumar
[1] Yu Sasaki. Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds , 2012, INDOCRYPT.
[2] Kyoji Shibutani,et al. The 128-Bit Blockcipher CLEFIA (Extended Abstract) , 2007, FSE.
[3] Hideki Imai,et al. On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses , 1989, CRYPTO.
[4] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[5] Vincent Rijmen,et al. Known-Key Distinguishers for Some Block Ciphers , 2007, ASIACRYPT.
[6] Yu Sasaki,et al. Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes , 2011, FSE.
[7] Kenneth H. Rosen,et al. Discrete Mathematics and its applications , 2000 .
[8] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[9] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[10] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[13] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[14] Mridul Nandi,et al. Progress in Cryptology - INDOCRYPT 2012 , 2012, Lecture Notes in Computer Science.
[15] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.
[16] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[17] Kyoji Shibutani,et al. Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract , 2011, ACISP.
[18] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[19] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1985, CRYPTO.
[20] Masanobu Katagi,et al. The 128-Bit Blockcipher CLEFIA , 2007, RFC.
[21] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.