Fast Fourier Transform Key Recovery for Integral Attacks
暂无分享,去创建一个
[1] John P. Steinberger,et al. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations , 2012, IACR Cryptol. ePrint Arch..
[2] Yu Sasaki,et al. Comprehensive Study of Integral Analysis on 22-Round LBlock , 2012, ICISC.
[3] Hideki Imai,et al. On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses , 1989, CRYPTO.
[4] Kyoji Shibutani,et al. The 128-Bit Blockcipher CLEFIA (Extended Abstract) , 2007, FSE.
[5] Hongjun Wu,et al. Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis , 2011, ACISP.
[6] Sangwoo Park,et al. On the Security of CAMELLIA against the Square Attack , 2002, FSE.
[7] Andrey Bogdanov,et al. Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA , 2013, Selected Areas in Cryptography.
[8] Vincent Rijmen,et al. The Block Cipher Square , 1997, FSE.
[9] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[10] Bruce Schneier,et al. Improved Cryptanalysis of Rijndael , 2000, FSE.
[11] John P. Steinberger,et al. On the Indifferentiability of Key-Alternating Ciphers , 2013, IACR Cryptol. ePrint Arch..
[12] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[13] Matt Henricksen,et al. Bit-Pattern Based Integral Attack , 2008, FSE.
[14] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[15] Yishay Mansour,et al. A construction of a cipher from a single pseudorandom permutation , 1997, Journal of Cryptology.
[16] Huaxiong Wang,et al. On Multidimensional Linear Cryptanalysis , 2010, ACISP.
[17] Yanjun Li,et al. Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher , 2011, WISA.
[18] Toshinobu Kaneko,et al. Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher , 1999 .
[19] Adi Shamir,et al. Minimalism in Cryptography: The Even-Mansour Scheme Revisited , 2012, EUROCRYPT.
[20] Yu Sasaki,et al. Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers , 2012, Selected Areas in Cryptography.
[21] Jean-Jacques Quisquater,et al. Improving the Time Complexity of Matsui's Linear Cryptanalysis , 2007, ICISC.