New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract)
暂无分享,去创建一个
[1] Josef Pieprzyk,et al. A General Purpose Technique for Locating Key Scheduling Weakness in DES-like Cryptosystems (Extended Abstract) , 1991, ASIACRYPT.
[2] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[3] Arthur Sorkin,et al. Lucifer, a Cryptographic Algorithm , 1984, Cryptologia.
[4] Jennifer Seberry,et al. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI , 1991, ASIACRYPT.
[5] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[6] Eli Biham,et al. Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer , 1991, CRYPTO.
[7] Jennifer Seberry,et al. LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications , 1990, AUSCRYPT.
[8] Jennifer Seberry,et al. Key Scheduling In Des Type Cryptosystems , 1990, AUSCRYPT.
[9] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[10] A. Shimizu,et al. Fast data encipherment algorithm FEAL-8 , 1978 .
[11] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[12] Shoji Miyaguchi,et al. Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.