Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA
暂无分享,去创建一个
[1] Takeshi Shimoyama,et al. Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6 , 2000 .
[2] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[3] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[4] SpillmanRichard,et al. Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers , 1993 .
[5] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[6] Willi Meier,et al. Correlations in RC6 with a Reduced Number of Rounds , 2000, FSE.
[7] Sangjin Lee,et al. Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA , 2002, FSE.
[8] Bruce Schneier,et al. Mod n Cryptanalysis, with Applications Against RC5P and M6 , 1999, FSE.
[9] Victor J. Rayward-Smith,et al. The Cryptanalysis of a Three Rotor Machine Using a Genetic Algorithm , 1997, ICGA.