Author:
Dunkelman Orr,Keller Nathan
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference26 articles.
1. 3GPP TS 35.201: 3rd Generation Partnership Project: Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI Specification V3.1.1. (2001).
2. Babbage S., Frisch L.: On MISTY1 higher order differential cryptanalysis. In: Won D. (ed.) ICISC. Lecture Notes in Computer Science, vol. 2015, pp. 22–36. Springer, Heidelberg (2000).
3. Biham E.: New types of cryptanalytic attacks using related keys. J. Cryptol. 7(4), 229–246 (1994).
4. Biham E., Biryukov A., Shamir A.: Miss in the middle attacks on IDEA and Khufu. In: Knudsen L.R. (ed.) FSE. Lecture Notes in Computer Science, vol. 1636, pp. 124–138. Springer, Berlin (1999).
5. Biham E., Dunkelman O., Keller N.: A unified approach to related-key attacks. In: Nyberg K. (ed.) FSE. Lecture Notes in Computer Science, vol. 5086, pp. 73–96. Springer, Berlin (2008).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献