Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers
暂无分享,去创建一个
Daesung Kwon | Woo-Hwan Kim | Jung-Keun Lee | Dongyoung Roh | Bonwook Koo | Daesung Kwon | Woo-Hwan Kim | Bonwook Koo | Jung-Keun Lee | Dongyoung Roh
[1] Jingwei Li,et al. Cycle-walking revisited: consistency, security, and efficiency , 2013, Secur. Commun. Networks.
[2] David A. Wagner,et al. Integral Cryptanalysis , 2002, FSE.
[3] Bart Preneel,et al. Topics in Cryptology — CT-RSA 2002 , 2002, Lecture Notes in Computer Science.
[4] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[5] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[6] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[7] Paul Crowley,et al. Mercy: A Fast Large Block Cipher for Disk Sector Encryption , 2000, FSE.
[8] Andrey Bogdanov,et al. Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.
[9] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[10] Walter M. Lioen,et al. Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.
[11] Phillip Rogaway,et al. How to Encipher Messages on a Small Domain , 2009, CRYPTO.
[12] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2013 , 2013, Lecture Notes in Computer Science.
[13] Phillip Rogaway,et al. Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time , 2014, EUROCRYPT.
[14] Vincent Rijmen,et al. Rijndael/AES , 2005, Encyclopedia of Cryptography and Security.
[15] Ran Canetti,et al. Advances in Cryptology – CRYPTO 2012 , 2012, Lecture Notes in Computer Science.
[16] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[17] Eli Biham,et al. Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.
[18] Jacques Patarin,et al. The "Coefficients H" Technique , 2009, Selected Areas in Cryptography.
[19] Phillip Rogaway,et al. An Enciphering Scheme Based on a Card Shuffle , 2012, CRYPTO.
[20] John P. Steinberger,et al. The preimage security of double-block-length compression functions , 2011, IACR Cryptol. ePrint Arch..
[21] David A. Wagner,et al. Tweakable Block Ciphers , 2002, Journal of Cryptology.
[22] Jacques Patarin,et al. Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security , 2003, CRYPTO.
[23] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[24] Vincent Rijmen,et al. Linear hulls with correlation zero and linear cryptanalysis of block ciphers , 2014, Des. Codes Cryptogr..
[25] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[26] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[27] Moses D. Liskov,et al. On Tweaking Luby-Rackoff Blockciphers , 2007, ASIACRYPT.
[28] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[29] Mitsuru Matsui,et al. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis , 2000, Selected Areas in Cryptography.
[30] Elisabeth Oswald,et al. Advances in Cryptology – EUROCRYPT 2014 , 2014, Lecture Notes in Computer Science.
[31] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .
[32] Jacques Patarin,et al. Security of Random Feistel Schemes with 5 or More Rounds , 2004, CRYPTO.
[33] Lars R. Knudsen,et al. Truncated and Higher Order Differentials , 1994, FSE.
[34] John Black,et al. Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.
[35] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[36] Eli Biham,et al. The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.
[37] David A. Wagner,et al. The Boomerang Attack , 1999, FSE.
[38] Seokhie Hong,et al. Provable Security against Differential and Linear Cryptanalysis for the SPN Structure , 2000, FSE.
[39] Thomas Ristenpart,et al. The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries , 2013, CRYPTO.
[40] Serge Vaudenay,et al. On the Lai-Massey Scheme , 1999, ASIACRYPT.