Author:
Nachef Valerie,Patarin Jacques,Volte Emmanuel
Publisher
Springer International Publishing
Reference15 articles.
1. Biham, E.: How to forge DES encrypted messages in 228 steps. Available at http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1996/CS/CS0884.ps.gz
2. Biryukov, A.: Related-key cyptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.), Advances in Cryptology – ASIACRYPT ’09, vol. 5912, Lecture Notes in Computer Science, pp. 1–18. Springer, Heidelberg (2009)
3. Daemen, J.: Limitations of the even-mansour construction. In: Imai, H., Rivest, R.L., Matsumo, K. (eds.), Advances in Cryptology – ASIACRYPT ’91, vol. 739, Lecture Notes in Computer Science, pp. 495–498. Springer, Heidelberg (1991)
4. Dunkelman, O., Keller, N., Shamir, A.: Minimalism in cryptography: the even-mansour scheme revisited. In: Pointcheval, D., Johansson, T. (eds.), Advances in Cryptology – EUROCRYPT ’12, vol. 7237, Lecture Notes in Computer Science, pp. 336–354. Springer, Heidelberg (2012)
5. Kelsey, J., Schneier, B., Wagner, D.: Key-schedule cryptanalysis of IDEAn G-DES, GOST, SAFER and Triple-DES. In: Koblitz, N. (ed.), Advances in Cryptology – CRYPTO ’96, vol. 1109, Lecture Notes in Computer Science, pp. 237–251. Springer, Heidelberg ( 1998)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献