Introduction to Cryptanalysis and Generic Attacks
暂无分享,去创建一个
Valérie Nachef | Jacques Patarin | Emmanuel Volte | Jacques Patarin | Valérie Nachef | Emmanuel Volte
[1] Valérie Nachef,et al. Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions , 2007, ASIACRYPT.
[2] Meiqin Wang,et al. A Model for Structure Attacks, with Applications to PRESENT and Serpent , 2012, FSE.
[3] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[4] Valérie Nachef,et al. Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions , 2006, ASIACRYPT.
[5] Lars R. Knudsen. Luby-Rackoff Ciphers , 2005, Encyclopedia of Cryptography and Security.
[6] Marine Minier,et al. New Results on the Pseudorandomness of Some Blockcipher Constructions , 2001, FSE.
[7] Moni Naor,et al. On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited , 1996, Journal of Cryptology.
[8] Vincent Rijmen,et al. Two Attacks on Reduced IDEA , 1997, EUROCRYPT.
[9] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[10] Charanjit S. Jutla,et al. Generalized Birthday Arracks on Unbalanced Feistel Networks , 1998, CRYPTO.
[11] Valérie Nachef,et al. Generic Attacks on Misty Schemes , 2010, LATINCRYPT.
[12] Jacques Patarin,et al. Generic Attacks on Feistel Networks with Internal Permutations , 2009, AFRICACRYPT.
[13] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[14] Céline Blondeau,et al. Multiple Differential Cryptanalysis: Theory and Practice , 2011, FSE.
[15] Valérie Nachef,et al. Differential Attacks on Generalized Feistel Schemes , 2013, CANS.
[16] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[17] Jacques Patarin,et al. Generic Attacks on Feistel Schemes , 2001, ASIACRYPT.
[18] Eli Biham,et al. Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials , 1999 .
[19] Eli Biham,et al. Differential Cryptanalysis of the Full 16-Round DES , 1992, CRYPTO.
[20] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[21] Valérie Nachef,et al. Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions , 2007, ASIACRYPT.
[22] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.