Author:
Piret Gilles,Quisquater Jean-Jacques
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Barreto, P.S.L.M., Rijmen, V.: The Khazad Legacy-Level Block Cipher. Submitted as a NESSIE Candidate Algorithm, Available at
http://www.cryptonessie.org
2. Lecture Notes in Computer Science;T. Iwata,2002
3. Lecture Notes in Computer Science;T. Iwata,2002
4. Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2), 373–386 (1988)
5. Lecture Notes in Computer Science;S. Lucks,1996
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Key alternating ciphers based on involutions;Designs, Codes and Cryptography;2017-06-02
2. Security of the Misty Structure beyond the Birthday Bound;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2014
3. Increasing Block Sizes Using Feistel Networks: The Example of the AES;Cryptography and Security: From Theory to Applications;2012
4. Security of the Misty Structure Using Involutions as Round Functions;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2010
5. Generic Attacks on Misty Schemes;Lecture Notes in Computer Science;2010