A Key-schedule Weakness in SAFER K-64
暂无分享,去创建一个
[1] Serge Vaudenay,et al. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.
[2] Lars R. Knudsen,et al. Cryptanalysis of LOKI91 , 1992, AUSCRYPT.
[3] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[4] James L. Massey,et al. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm , 1993, FSE.
[5] James L. Massey,et al. SAFER K-64: One Year Later , 1994, FSE.
[6] Lars R. Knudsen,et al. Block Ciphers: Analysis, Design and Applications , 1994 .
[7] Joos Vandewalle,et al. Computer Security and Industrial Cryptography , 1993, Lecture Notes in Computer Science.
[8] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[9] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[10] Jean-Jacques Quisquater,et al. How Easy is Collision Search? Application to DES (Extended Summary) , 1990, EUROCRYPT.
[11] Carlo Harpes,et al. A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma , 1995, EUROCRYPT.
[12] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.