Author:
Boura Christina,Canteaut Anne,Knudsen Lars R.,Leander Gregor
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference26 articles.
1. Albrecht M.R., Farshim P., Paterson K.G., Watson G.J.: On cipher-dependent related-key attacks in the ideal-cipher model. In: Fast Software Encryption—FSE 2011. Lecture Notes in Computer Science, vol. 6733, pp. 128–145. Springer, Berlin (2011).
2. Barreto P., Rijmen V.: The ANUBIS Block Cipher. Submission to the NESSIE project. https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html (2000).
3. Barreto P., Rijmen V.: The Khazad Legacy-Level Block Cipher. Submission to the NESSIE project. https://www.cosic.esat.kuleuven.be/nessie/workshop/submissions.html (2000).
4. Bellare M., Kohno T.: A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In: Advances in Cryptology—EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 491–506. Springer, Berlin (2003).
5. Biryukov A.: DES-X (or DESX). In: van Tilborg H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd edn, p. 331. Springer, Berlin (2011).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献