DES and Variants: 3DES, DES – X
暂无分享,去创建一个
[1] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[2] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[3] Stefan Lucks,et al. Attacking Triple Encryption , 1998, FSE.
[4] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[5] Chris J. Mitchell,et al. On the Security of 2-Key Triple DES , 2016, IEEE Transactions on Information Theory.
[6] Joan Daemen,et al. Limitations of the Even-Mansour Construction , 1991, ASIACRYPT.
[7] Yannick Seurin,et al. An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher , 2012, ASIACRYPT.
[8] Alex Biryukov,et al. Related-Key Cryptanalysis of the Full AES-192 and AES-256 , 2009, ASIACRYPT.
[9] Adi Shamir,et al. Minimalism in Cryptography: The Even-Mansour Scheme Revisited , 2012, EUROCRYPT.
[10] Phillip Rogaway. The Security of DESX , 1996 .
[11] Serge Vaudenay. Related-key attack against triple encryption based on fixed points , 2011, Proceedings of the International Conference on Security and Cryptography.
[12] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[13] Henri Gilbert,et al. A Known Plaintext Attack of FEAL-4 and FEAL-6 , 1991, CRYPTO.
[14] Martin E. Hellman,et al. On the security of multiple encryption , 1981, CACM.