FOX Specifications Version 1.2
暂无分享,去创建一个
[1] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[2] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[3] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[4] Alex Biryukov,et al. Advanced Slide Attacks , 2000, EUROCRYPT.
[5] Serge Vaudenay,et al. Decorrelation: A Theory for Block Cipher Security , 2003, Journal of Cryptology.
[6] Eiji Okamoto,et al. Advances in cryptology--ASIACRYPT'99 : International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 : proceedings , 1999 .
[7] Eli Biham,et al. Enhancing Differential-Linear Cryptanalysis , 2002, ASIACRYPT.
[8] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[9] S. Vaudenay,et al. Perfect diffusion primitives for block ciphers - building efficient MDS matrices , 2004 .
[10] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[11] Serge Vaudenay,et al. FOX : A New Family of Block Ciphers , 2004, Selected Areas in Cryptography.
[12] Don Coppersmith,et al. Matrix multiplication via arithmetic progressions , 1987, STOC.
[13] Serge Vaudenay,et al. On the Lai-Massey Scheme , 1999, ASIACRYPT.
[14] Serge Vaudenay,et al. Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness , 1999, Selected Areas in Cryptography.
[15] Serge Vaudenay,et al. Black Box Cryptanalysis of Hash Networks Based on Multipermutations , 1994, EUROCRYPT.
[16] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[17] David Wagner,et al. Integral Cryptanalysis (Extended abstract) , 2002, FSE 2002.
[18] Josef Pieprzyk,et al. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.
[19] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[20] Susan K. Langford,et al. Differential-Linear Cryptanalysis , 1994, CRYPTO.
[21] Sean Murphy. Comments on the Security of the AES and the XSL Technique , 2002 .
[22] Hongjun Wu,et al. Related-Cipher Attacks , 2002, ICICS.
[23] Seokhie Hong,et al. Provable Security against Differential and Linear Cryptanalysis for the SPN Structure , 2000, FSE.