Randomness Evaluation Framework of Cryptographic Algorithms
暂无分享,去创建一个
[1] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[2] Nicolas Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[3] Tao Wang,et al. Cache Timing Attacks on Camellia Block Cipher , 2009, IACR Cryptol. ePrint Arch..
[4] Jongsung Kim,et al. The higher-order meet-in-the-middle attack and its application to the Camellia block cipher , 2012, Theor. Comput. Sci..
[5] Bart Preneel,et al. Resynchronization Attacks on WG and LEX , 2006, FSE.
[6] Dawu Gu,et al. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia , 2012, FSE.
[7] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[8] Xuejia Lai. Higher Order Derivatives and Differential Cryptanalysis , 1994 .
[9] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[10] Alex Biryukov,et al. The Design of a Stream Cipher LEX , 2006, Selected Areas in Cryptography.
[11] Leibo Li,et al. New Impossible Differential Attacks on Camellia , 2012, ISPEC.
[12] Chen Hua. A New Statistical Test on Block Ciphers , 2009 .
[13] Eli Biham,et al. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials , 1999 .
[14] Orr Dunkelman,et al. A New Attack on the LEX Stream Cipher , 2008, ASIACRYPT.
[15] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[16] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[17] Kazukuni Kobara,et al. Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis , 2001, ASIACRYPT.
[18] S Meltem,et al. ON STATISTICAL ANALYSIS OF SYNCHRONOUS STREAM CIPHERS , 2008 .
[19] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[20] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[21] Toshinobu Kaneko,et al. A Study on the effect of cache structure to the cache timing attack for a block cipher , 2004 .
[22] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[23] Pierre L'Ecuyer,et al. TestU01: A C library for empirical testing of random number generators , 2006, TOMS.
[24] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.