Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference19 articles.
1. [1] ETSI, Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP confidentiality and integrity algorithms. Document 2: Kasumi algorithm specification (3GPP TS 35.202 version 3.1.2 Release 1999).
2. [2] V.T. Hoang, B. Morris and P. Rogaway, “An enciphering scheme based on a card shuffle,” CRYPTO 2012, LNCS 7417, pp.7-13, Springer-Verlag, 2012.
3. [3] V.T. Hoang and P. Rogaway, “On generalized feistel networks,” CRYPTO 2010, LNCS, vol.6223, pp.613-630, Springer-Verlag, 2010.
4. [4] T. Iwata, T. Yoshino, and K. Kurosawa, “Non-cryptographic primitive for pseudorandom permutation,” FSE 2002, LNCS 2365, pp.149-163, Springer-Verlag, 2002.
5. [5] T. Iwata, T. Yoshino, T. Yuasa, and K. Kurosawa, “Round security and super-pseudorandomness of MISTY type structure,” FSE 2001, LNCS 2355, pp.233-247, Springer-Verlag, 2001.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献