Affiliation:
1. Attached Institute of ETRI
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference12 articles.
1. [1] P. Barreto and V. Rijmen, The Khazad legacy-level block cipher, Submission to the NESSIE Project.
2. [2] P. Barreto and V. Rijmen, The Anubis block cipher, Submission to the NESSIE Project.
3. [3] M. Bellare and P. Rogaway, “The security of triple encryption and a framework for code-based game-playing proofs, ” Eurocrypt'06, LNCS 4004, pp.409-426, Springer-Verlag, 2006.
4. [4] M. Bellare and P. Rogaway, “Code-based game-playing proofs and the security of triple encryption, ” Cryptology ePrint archive report 2004/331, 2006.
5. [5] S. Chowla, I.N. Herstein, and K. Moore, “On recursions connected with symmetric groups I, ” Canadian J. Math. 3, pp.328-334, 1951.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Key alternating ciphers based on involutions;Designs, Codes and Cryptography;2017-06-02