Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher
暂无分享,去创建一个
[1] Yu Sasaki,et al. Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers , 2012, Selected Areas in Cryptography.
[2] Chae Hoon Lim,et al. CRYPTON: A New 128-bit Block Cipher - Specification and Analysis , 1998 .
[3] Stefan Lucks. The Saturation Attack - A Bait for Twofish , 2000, FSE.
[4] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[5] Jorge Nakahara,et al. 3D: A Three-Dimensional Block Cipher , 2008, CANS.
[6] Vincent Rijmen,et al. The KHAZAD Legacy-Level Block Cipher , 2001 .
[7] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[8] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[9] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[10] Azmi Jaafar,et al. Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems , 2012, Int. J. Nat. Comput. Res..
[11] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[12] Suriyani Ariffin. Secure block cipher inspired by the human immune system , 2012 .
[13] Vincent Rijmen,et al. The Cipher SHARK , 1996, FSE.
[14] Yosuke Todo. FFT-Based Key Recovery for the Integral Attack , 2014, IACR Cryptol. ePrint Arch..
[15] Jean-Jacques Quisquater,et al. Integral Cryptanalysis on reduced-round Safer++ , 2003, IACR Cryptol. ePrint Arch..
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Jongsung Kim,et al. Amplified Boomerang Attack against Reduced-Round SHACAL , 2002, ASIACRYPT.
[18] Azmi Jaafar,et al. Byte Permutations in Block Cipher Based on Immune Systems , 2011 .
[19] K. P. Subbalakshmi,et al. High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive , 2006, ACNS.
[20] Bruce Schneier,et al. A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS , 2000, Cryptologia.
[21] Wang Xiao-yun. Saturation cryptanalysis of CLEFIA , 2008 .
[22] Paulo S. L. M. Barreto,et al. CURUPIRA, a block cipher for constrained platforms , 2007 .
[23] Dengguo Feng,et al. Integral Cryptanalysis of Reduced FOX Block Cipher , 2005, ICISC.
[24] Orr Dunkelman,et al. The effects of the omission of last round's MixColumns on AES , 2010, Inf. Process. Lett..
[25] Azmi Jaafar,et al. Immune Systems Approaches for Cryptographic Algorithm , 2011, 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications.
[26] David Wagner,et al. Integral Cryptanalysis (Extended abstract) , 2002, FSE 2002.
[27] William Stallings,et al. Cryptography and network security , 1998 .
[28] Massimiliano Sala,et al. Implementation and improvement of the Partial Sum Attack on 6-round AES , 2014, IACR Cryptol. ePrint Arch..
[29] Jyoti Malik,et al. A Review of Various Techniques of Cryptanalysis , 2012 .
[30] M. Z’aba. Analysis of linear relationships in block ciphers , 2010 .
[31] Jue Wu,et al. Cross Entropy: A New Solver for Markov Random Field Modeling and Applications to Medical Image Segmentation , 2005, MICCAI.
[32] Lars R. Knudsen,et al. Advanced Encryption Standard (AES) - An Update , 1999, IMACC.
[33] Daniyal M. Alghazzawi,et al. Advanced Encryption Standard - Cryptanalysis research , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).