Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference20 articles.
1. Barreto P., Rijmen V.: The Anubis block cipher. Submission to the NESSIE Project (2000).
2. Barreto P., Rijmen V.: The Khazad legacy-level block cipher. Submission to the NESSIE Project (2000).
3. Borghoff J., Canteaut A., Güneysu T., Kavun E.B., Knežević M., Knudsen L.R., Leander G., Nikov V., Paar C., Rechberger C., Rombouts P., Thomsen S.S., Yalçın T.: PRINCE: a low-latency block cipher for pervasive computing applications. In: Asiacrypt 2012. LNCS, vol. 7658, pp. 208–225. Springer, Berlin (2012).
4. Chen S., Lampe R., Lee J., Seurin Y., Steinberger J.: Minimizing the two-round Even–Mansour cipher. In: Crypto 2014 (Part I). LNCS, vol. 8616, pp. 39–56. Springer, Berlin (2014).
5. Chen S., Steinberger J.P.: Tight security bounds for key-alternating ciphers. In: Eurocrypt 2014. LNCS, vol. 8441, pp. 327–350. Springer, Berlin (2014).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献