Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128
暂无分享,去创建一个
Seokhie Hong | Jongin Lim | Changhoon Lee | Kitae Jeong | Jaechul Sung | Jongin Lim | Seokhie Hong | Kitae Jeong | Changhoon Lee | Jaechul Sung
[1] Jongsung Kim,et al. Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b , 2006, SCN.
[2] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[3] Nikolay A. Moldovyan,et al. New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..
[4] Sangjin Lee,et al. A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.
[5] Victor A. Skormin,et al. Information Assurance in Computer Networks , 2001, Lecture Notes in Computer Science.
[6] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[7] O. Koufopavlou,et al. A new DDP based cipher CIKS-128h architecture design LSI implementation optimization of CBC encryption hashing over 1Gbps , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[8] Seokhie Hong,et al. Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.
[9] Nikolay A. Moldovyan,et al. Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.
[10] Aggelos Kiayias,et al. Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers , 2005, Mycrypt.
[11] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.
[12] N.D. Goots,et al. Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[13] Jongsung Kim,et al. Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b , 2005, Mycrypt.
[14] Nikolay A. Moldovyan,et al. A cipher based on data-dependent permutations , 2001, Journal of Cryptology.
[15] Jongsung Kim,et al. Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 , 2005, IMACC.
[16] Odysseas G. Koufopavlou,et al. High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers , 2005, Mob. Networks Appl..
[17] Seokhie Hong,et al. Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.
[18] Eli Biham,et al. Related-Key Boomerang and Rectangle Attacks , 2005, EUROCRYPT.
[19] Computer Network Security , 2005 .
[20] Jongsung Kim,et al. Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192 , 2005, FSE.
[21] Anne Canteaut,et al. Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings , 2004, INDOCRYPT.
[22] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[23] Seokhie Hong,et al. Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property , 2003, MMM-ACNS.