All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach
暂无分享,去创建一个
[1] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[2] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[3] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[4] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[5] Carlisle M. Adams,et al. The CAST-128 Encryption Algorithm , 1997, RFC.
[6] Carlisle M. Adams,et al. Constructing Symmetric Ciphers Using the CAST Design Procedure , 1997, Des. Codes Cryptogr..
[7] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[8] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[9] Serge Vaudenay,et al. FOX : A New Family of Block Ciphers , 2004, Selected Areas in Cryptography.
[10] Dengguo Feng,et al. Integral Cryptanalysis of Reduced FOX Block Cipher , 2005, ICISC.
[11] Seungjoo Kim,et al. Information Security and Cryptology - ICISC 2005 , 2005, Lecture Notes in Computer Science.
[12] Lee Sangjin,et al. Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2 , 2005 .
[13] Orhun Kara,et al. A New Class of Weak Keys for Blowfish , 2007, FSE.
[14] Changhui Hu,et al. New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 , 2008, Selected Areas in Cryptography.
[15] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[16] Kyoji Shibutani,et al. Preimage Attacks on Reduced Tiger and SHA-2 , 2009, FSE.
[17] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[18] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[19] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[20] Moti Yung,et al. A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.
[21] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[22] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[23] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[24] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[25] Huaxiong Wang,et al. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 , 2010, ASIACRYPT.
[26] María Naya-Plasencia,et al. Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems , 2010, ASIACRYPT.
[27] Markus Kasper,et al. The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..
[28] K. P. Chow,et al. New Differential Cryptanalytic Results for Reduced-Round CAST-128 , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[29] Andrey Bogdanov,et al. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN , 2010, IACR Cryptol. ePrint Arch..
[30] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[31] Dmitry Khovratovich,et al. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..
[32] Takanori Isobe. A Single-Key Attack on the Full GOST Block Cipher , 2011, FSE.
[33] Kyoji Shibutani,et al. Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo , 2012, ACISP.
[34] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[35] Gaëtan Leurent,et al. Narrow-Bicliques: Cryptanalysis of Full IDEA , 2012, EUROCRYPT.
[36] Yu Sasaki,et al. Three-Subset Meet-in-the-Middle Attack on Reduced XTEA , 2012, AFRICACRYPT.
[37] Serge Vaudenay,et al. Progress in Cryptology - AFRICACRYPT 2012 , 2012, Lecture Notes in Computer Science.
[38] Paul C. van Oorschot,et al. Parallel Collision Search with Cryptanalytic Applications , 2013, Journal of Cryptology.