HIGHT: A New Block Cipher Suitable for Low-Resource Device
暂无分享,去创建一个
Jongsung Kim | Seokhie Hong | Donghoon Chang | Sangjin Lee | Jongin Lim | Seongtaek Chee | Changhoon Lee | Hyun Kim | Kitae Jeong | Jaechul Sung | Deukjo Hong | Jesang Lee | Bonseok Koo | Jongin Lim | S. Chee | Sangjin Lee | Seokhie Hong | Kitae Jeong | Changhoon Lee | D. Chang | Jaechul Sung | Jesang Lee | Jongsung Kim | Deukjo Hong | Bonseok Koo | Hyun Kim
[1] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[2] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[3] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[4] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[5] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[6] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[7] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[8] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[9] Alex Biryukov,et al. Advanced Slide Attacks , 2000, EUROCRYPT.
[10] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[11] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[12] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[13] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[14] Stefan Lucks. The Saturation Attack - A Bait for Twofish , 2000, FSE.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[17] Alex Biryukov,et al. Slide Attacks , 1999, FSE.
[18] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[19] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[20] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[21] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[22] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[23] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[24] Eli Biham,et al. New Results on Boomerang and Rectangle Attacks , 2002, FSE.
[25] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[26] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.