Security of the Misty Structure Using Involutions as Round Functions
暂无分享,去创建一个
[1] Vincent Rijmen,et al. The KHAZAD Legacy-Level Block Cipher , 2001 .
[2] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[3] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[4] Jean-Jacques Quisquater,et al. Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results , 2004, Selected Areas in Cryptography.
[5] Kaoru Kurosawa,et al. Non-cryptographic Primitive for Pseudorandom Permutation , 2002, FSE.
[6] Kaoru Kurosawa,et al. Round Security and Super-Pseudorandomness of MISTY Type Structure , 2001, FSE.
[7] Mitsuru Matsui,et al. New Block Encryption Algorithm MISTY , 1997, FSE.
[8] S. Chowla,et al. On Recursions Connected With Symmetric Groups I , 1951, Canadian Journal of Mathematics.
[9] Jean-Didier Legat,et al. ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware , 2004, FSE.
[10] K. Sakurai,et al. On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security) , 1997 .