Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
暂无分享,去创建一个
[1] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[2] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[3] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[4] Eli Biham,et al. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials , 1999 .
[5] Jongsung Kim,et al. Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 , 2004, ACISP.
[6] Jongsung Kim,et al. Related-Key Attacks on Reduced Rounds of SHACAL-2 , 2004, INDOCRYPT.
[7] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[8] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , 2005, FSE.
[9] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[10] Bruce Schneier,et al. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.
[11] Gaoli Wang. Related-Key Rectangle Attack on 43-Round SHACAL-2 , 2007, ISPEC.
[12] Jongsung Kim,et al. Related-Key Rectangle Attack on 42-Round SHACAL-2 , 2006, ISC.
[13] Jongsung Kim,et al. Impossible Differential Attack on 30-Round SHACAL-2 , 2003, INDOCRYPT.
[14] Eli Biham,et al. New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract) , 1994, EUROCRYPT.