NESSIE: A European Approach to Evaluate Cryptographic Algorithms
暂无分享,去创建一个
[1] Bart Preneel,et al. Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.
[2] Joos Vandewalle,et al. Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 , 1995 .
[3] Paulo S. L. M. Barreto,et al. Improved SQUARE Attacks against Reduced-Round HIEROCRYPT , 2001, FSE.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[6] Steve Babbage,et al. Cryptanalysis of LILI-128 , 2001 .
[7] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[8] Vincent Rijmen,et al. Differential Cryptanalysis of Q , 2001, FSE.
[9] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[10] Vladimir Furman. Differential Cryptanalysis of Nimbus , 2001, FSE.
[11] Serge Vaudenay,et al. An experiment on DES statistical cryptanalysis , 1996, CCS '96.
[12] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[13] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[14] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[15] Stefan Lucks,et al. Bias in the LEVIATHAN Stream Cipher , 2001, FSE.
[16] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[17] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[18] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.