Author:
Borisov Nikita,Chew Monica,Johnson Rob,Wagner David
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Eli Biham and Adi Shamir. Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, 4(1):3–72, 1991.
2. Joan Daemen, Rene Govaerts, and Joos Vandewalle. Weak keys for IDEA. In CRYPTO, pages 224–231, 1993.
3. Joan Daemen, Luc van Linden, Rene Govaerts, and Joos Vandewalle. Propagation properties of multiplication modulo 2n-1. In G. H. L. M. Heideman et.al., editor, Thirteenth Symp. on Information Theory in the Benelux, pages 111–118, Enschede (NL), 1–2 1992. Werkgemeen-schap Informatieen Communicatietheorie, Enschede (NL).
4. Vladimir Furman. Differential cryptanalysis of Nimbus. In Fast Software Encryption. Springer-Verlag, 2001.
5. Carlo Harpes, Gerhard G. Kramer, and James L. Massey. A Generalization of Linear Cryptanalysis and the Applicability of Matsui’s Piling-up Lemma. In EUROCRYPT’ 95. Springer-Verlag, May 1995.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献