WHIRLBOB, the Whirlpool Based Variant of STRIBOB
暂无分享,去创建一个
[1] Markku-Juhani O. Saarinen. STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation , 2015, IACR Cryptol. ePrint Arch..
[2] Vincent Rijmen,et al. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool , 2015, Journal of Cryptology.
[3] Atul Luykx,et al. Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes , 2014, IACR Cryptol. ePrint Arch..
[4] Markku-Juhani O. Saarinen. Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor , 2014, TrustED '14.
[5] Guido Bertoni,et al. Sakura: A Flexible Coding for Tree Hashing , 2014, ACNS.
[6] Markku-Juhani O. Saarinen. Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation , 2014, CT-RSA.
[7] Benedikt Heinz,et al. A Cache Timing Attack on AES in Virtualization Environments , 2012, Financial Cryptography.
[8] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[9] Michael A. Peck,et al. Suite B Profile for Internet Protocol Security (IPsec) , 2011, RFC.
[10] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[11] Kevin M. Igoe. Suite B Cryptographic Suites for Secure Shell (SSH) , 2011, RFC.
[12] Billy Bob Brumley,et al. Secure and Fast Implementations of Two Involution Ciphers , 2010, NordSec.
[13] Guido Bertoni,et al. Sponge-Based Pseudo-Random Number Generators , 2010, CHES.
[14] Vincent Rijmen,et al. Rebound Distinguishers: Results on the Full Whirlpool Compression Function , 2009, ASIACRYPT.
[15] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[16] Michael Hamburg,et al. Accelerating AES with Vector Permute Instructions , 2009, CHES.
[17] Alex Biryukov,et al. Distinguisher and Related-Key Attack on the Full AES-256 , 2009, CRYPTO.
[18] Florian Mendel,et al. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl , 2009, FSE.
[19] Russ Housley,et al. Suite B Profile for Transport Layer Security (TLS) , 2009, RFC.
[20] Ruby B. Lee,et al. Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation , 2008, FSE.
[21] Morris Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC , 2007 .
[22] Onur Aciiçmez,et al. Cache Based Remote Timing Attack on the AES , 2007, CT-RSA.
[23] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[24] Russ Housley,et al. Counter with CBC-MAC (CCM) , 2003, RFC.
[25] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[26] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[27] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[28] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[29] Vincent Rijmen,et al. The Cipher SHARK , 1996, FSE.
[30] Kaisa Nyberg,et al. Differentially Uniform Mappings for Cryptography , 1994, EUROCRYPT.
[31] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[32] М.-Ю О Сааринен,et al. StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 , 2015 .
[33] Alex Biryukov,et al. The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob , 2015, IACR Cryptol. ePrint Arch..
[34] G. B. Marshalko,et al. О новом российском стандарте шифрования , 2015 .
[35] Oleksandr Kazymyrov,et al. Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012 , 2013, IACR Cryptol. ePrint Arch..
[36] Nicolas Courtois,et al. How Fast can be Algebraic Attacks on Block Ciphers ? , 2006, IACR Cryptol. ePrint Arch..
[37] Vincent Rijmen,et al. The WHIRLPOOL Hashing Function , 2003 .
[38] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[39] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[40] S Miyaguchi,et al. 128ビットHash関数(N‐Hash) , 1990 .