Author:
Biryukov Alex,Mukhopadhyay Sourav,Sarkar Palash
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Babbage, S.: Improved “exhaustive search” attacks on stream ciphers. In: ECOS 1995 (European Convention on Security and Detection), no. 408. IEE Conference Publication (May 1995)
2. Biham, E.: How to decrypt or even substitute DES-encrypted messages in 228 steps. Information Processing Letters 84, 117–124 (2002)
3. Biham, E.: How to Forge DES-Encrypted Messages in 228 Steps. Technical report CS 884 (August 1996)
4. Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.??1592, pp. 12???23. Springer, Heidelberg (1999);
5. To appear in the Journal of Cryptology
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Sponge-Based PRF with Good Multi-user Security;Lecture Notes in Computer Science;2024
2. Quantum time/memory/data tradeoff attacks;Designs, Codes and Cryptography;2023-10-10
3. Multi-user BBB security of public permutations based MAC;Cryptography and Communications;2022-05-11
4. Tradeoff Attacks on Symmetric Ciphers;Cryptography - Recent Advances and Future Developments;2021-08-18
5. Precomputation for Rainbow Tables has Never Been so Fast;Computer Security – ESORICS 2021;2021