Author:
Kelsey John,Schneier Bruce,Wagner David
Publisher
Springer Berlin Heidelberg
Reference45 articles.
1. M. Bellare and P. Rogaway, “Optimal Asymmetric Encryption—How to Encrypt with RSA,” Advances in Cryptology—EUROCRYPT’ 94, Springer-Verlag, 1995, pp. 92–111.
2. I. Ben-Aroya and E. Biham, “Differential Cryptanalysis of Lucifer,” Advances in Cryptology CRYPTO’ 93, Springer-Verlag, 1994.
3. T.A. Berson, “Long Key Variants of DES,” Advances in Cryptology: CRYPTO’ 82, Plenum Press, 1983, pp. 311–313.
4. E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Advances in Cryptology—EUROCRYPT’ 93, Springer-Verlag, 1994, pp. 398–409.
5. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993, pp. 187–199.
Cited by
121 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing the Related-Key Security of PIPO Through New Key Schedules;Lecture Notes in Computer Science;2024
2. Triple-DES;Encyclopedia of Cryptography, Security and Privacy;2024
3. AES Encryption for Secure Storage and Transfer of Patient Health Records using Blockchain Technology;2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2023-11-03
4. A Secure Key Expansion Algorithm for Present;IEEE Sensors Journal;2023-10-15
5. Practical-Time Related-Key Attack on GOST with Secret S-Boxes;Advances in Cryptology – CRYPTO 2023;2023