Randomness Evaluation Framework of Cryptographic Algorithms

[1]  David A. Wagner,et al.  Integral Cryptanalysis , 2002, FSE.

[2]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[3]  Tao Wang,et al.  Cache Timing Attacks on Camellia Block Cipher , 2009, IACR Cryptol. ePrint Arch..

[4]  Jongsung Kim,et al.  The higher-order meet-in-the-middle attack and its application to the Camellia block cipher , 2012, Theor. Comput. Sci..

[5]  Bart Preneel,et al.  Resynchronization Attacks on WG and LEX , 2006, FSE.

[6]  Dawu Gu,et al.  New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia , 2012, FSE.

[7]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[8]  Xuejia Lai Higher Order Derivatives and Differential Cryptanalysis , 1994 .

[9]  Eli Biham,et al.  The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.

[10]  Alex Biryukov,et al.  The Design of a Stream Cipher LEX , 2006, Selected Areas in Cryptography.

[11]  Leibo Li,et al.  New Impossible Differential Attacks on Camellia , 2012, ISPEC.

[12]  Chen Hua A New Statistical Test on Block Ciphers , 2009 .

[13]  Eli Biham,et al.  Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials , 1999 .

[14]  Orr Dunkelman,et al.  A New Attack on the LEX Stream Cipher , 2008, ASIACRYPT.

[15]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[16]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[17]  Kazukuni Kobara,et al.  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis , 2001, ASIACRYPT.

[18]  S Meltem,et al.  ON STATISTICAL ANALYSIS OF SYNCHRONOUS STREAM CIPHERS , 2008 .

[19]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[20]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[21]  Toshinobu Kaneko,et al.  A Study on the effect of cache structure to the cache timing attack for a block cipher , 2004 .

[22]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[23]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[24]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.