Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher
暂无分享,去创建一个
[1] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[2] Iyad A. Ajwa,et al. Grobner Bases Algorithm , 1995 .
[3] Brian R. Duffy,et al. The language of machines , 2003, ISICT.
[4] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[5] Johan Wallén. Linear Approximations of Addition Modulo 2n , 2003, FSE.
[6] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[7] Adi Shamir,et al. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.
[8] Shai Halevi,et al. MARS - a candidate cipher for AES , 1999 .
[9] Thomas A. Berson,et al. Differential Cryptanalysis Mod 2^32 with Applications to MD5 , 1992, EUROCRYPT.
[10] Lars R. Knudsen,et al. Provable security against a differential attack , 1994, Journal of Cryptology.
[11] Philippe Dumas,et al. On the Additive Differential Probability of Exclusive-Or , 2004, FSE.
[12] Alex Biryukov,et al. Non-randomness of the Full 4 and 5-Pass HAVAL , 2004, SCN.
[13] Shiho Moriai,et al. Efficient Algorithms for Computing Differential Properties of Addition , 2001, FSE.
[14] Bruce Schneier,et al. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.
[15] J. Faugère. A new efficient algorithm for computing Gröbner bases (F4) , 1999 .
[16] David Thomas,et al. The Art in Computer Programming , 2001 .
[17] Adi Shamir,et al. New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.
[18] Frédéric Muller. Differential Attacks against the Helix Stream Cipher , 2004, FSE.
[19] Willi Meier,et al. Cryptographic Significance of the Carry for Ciphers Based on Integer Addition , 1990, CRYPTO.
[20] Bruce Schneier,et al. The Twofish encryption algorithm: a 128-bit block cipher , 1999 .
[21] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[22] Adi Shamir,et al. Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.