Calderini, Marco; Civino, Roberto; Invernizzi, Riccardo Differential experiments using parallel alternative operations. (English) Zbl 07819572 J. Math. Cryptol. 18, Article ID 20230030, 9 p. (2024). MSC: 20B35 94A60 68P25 PDFBibTeX XMLCite \textit{M. Calderini} et al., J. Math. Cryptol. 18, Article ID 20230030, 9 p. (2024; Zbl 07819572) Full Text: DOI arXiv OA License
Bellini, Emanuele; Gerault, David; Protopapa, Matteo; Rossi, Matteo Monte Carlo tree search for automatic differential characteristics search: application to SPECK. (English) Zbl 1519.94048 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 373-397 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Bellini} et al., Lect. Notes Comput. Sci. 13774, 373--397 (2023; Zbl 1519.94048) Full Text: DOI
Bijwe, Subodh; Chauhan, Amit Kumar; Sanadhya, Somitra Kumar Implementing Grover oracle for lightweight block ciphers under depth constraints. (English) Zbl 07719194 Nguyen, Khoa (ed.) et al., Information security and privacy. 27th Australasian conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13494, 85-105 (2022). MSC: 81P94 81P68 94A60 68P10 81P70 68Q06 PDFBibTeX XMLCite \textit{S. Bijwe} et al., Lect. Notes Comput. Sci. 13494, 85--105 (2022; Zbl 07719194) Full Text: DOI
Gunsing, Aldo Block-cipher-based tree hashing. (English) Zbl 07708475 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 205-233 (2022). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. Gunsing}, Lect. Notes Comput. Sci. 13510, 205--233 (2022; Zbl 07708475) Full Text: DOI
Ayyagari, Tarun; Saji, Anirudh; John, Anita; Jose, Jimmy Exploring lightweight S-boxes using cellular automata and reinforcement learning. (English) Zbl 1520.94036 Chopard, Bastien (ed.) et al., Cellular automata. 15th international conference on cellular automata for research and industry, ACRI 2022, Geneva, Switzerland, September 12–15, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13402, 17-28 (2022). MSC: 94A60 68Q80 68T05 PDFBibTeX XMLCite \textit{T. Ayyagari} et al., Lect. Notes Comput. Sci. 13402, 17--28 (2022; Zbl 1520.94036) Full Text: DOI
Boudali, Asmaa; Said, Naima Hadj; Ali-Pacha, Adda A new symmetrical cryptosystem based cellular automata and chaotic map function. (English) Zbl 07597240 J. Discrete Math. Sci. Cryptography 25, No. 5, 1435-1455 (2022). MSC: 68P25 37B15 68Q80 94A60 PDFBibTeX XMLCite \textit{A. Boudali} et al., J. Discrete Math. Sci. Cryptography 25, No. 5, 1435--1455 (2022; Zbl 07597240) Full Text: DOI
Shibutani, Kyoji; Iwata, Tetsu On the (im)possibility of improving the round diffusion of generalized Feistel structures. (English) Zbl 07444817 Inf. Process. Lett. 174, Article ID 106197, 5 p. (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{K. Shibutani} and \textit{T. Iwata}, Inf. Process. Lett. 174, Article ID 106197, 5 p. (2022; Zbl 07444817) Full Text: DOI
Courtois, N. T.; Grajek, M.; Rams, M. On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of enigma. (English) Zbl 1482.94047 Rad Hrvat. Akad. Znan. Umjet. 546, Mat. Znan. 25, 51-77 (2021). MSC: 94A60 68P25 20N05 05B15 13A50 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Rad Hrvat. Akad. Znan. Umjet., Mat. Znan. 546(25), 51--77 (2021; Zbl 1482.94047) Full Text: DOI
Daemen, Joan; Rijmen, Vincent The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. (English) Zbl 1437.94001 Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-60768-8/hbk; 978-3-662-60769-5/ebook). xviii, 282 p. (2020). MSC: 94-01 68-01 68P25 94A60 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. Berlin: Springer (2020; Zbl 1437.94001) Full Text: DOI
Bard, Gregory V. Determining whether a given cryptographic function is a permutation of another given cryptographic function – a problem in intellectual property. (English) Zbl 1455.94119 Theor. Comput. Sci. 800, 3-14 (2019). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 68T20 11T71 PDFBibTeX XMLCite \textit{G. V. Bard}, Theor. Comput. Sci. 800, 3--14 (2019; Zbl 1455.94119) Full Text: DOI
Knospe, Heiko A course in cryptography. (English) Zbl 1447.94001 Pure and Applied Undergraduate Texts 40. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-5055-7/hbk; 978-1-4704-5389-3/ebook). xvii, 323 p. (2019). Reviewer: Dimitros Poulakis (Thessaloniki) MSC: 94-01 94A60 68P25 81P94 11T71 PDFBibTeX XMLCite \textit{H. Knospe}, A course in cryptography. Providence, RI: American Mathematical Society (AMS) (2019; Zbl 1447.94001)
Courtois, Nicolas T.; Scarlata, Matteo; Georgiou, Marios How many weak-keys exist in T-310? (English) Zbl 1479.94147 Tatra Mt. Math. Publ. 73, 61-82 (2019). MSC: 94A60 01A60 94-03 68-03 68P25 14G50 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Tatra Mt. Math. Publ. 73, 61--82 (2019; Zbl 1479.94147) Full Text: DOI
Dragomir, Ioana Roxana; Vlad, Adriana Statistical testing of the initializing stage of a block cipher, as part of the security assessment. (English) Zbl 1513.94029 Sci. Bull., Ser. A, Appl. Math. Phys., Politeh. Univ. Buchar. 79, No. 2, 207-222 (2017). MSC: 94A60 68P25 62P30 PDFBibTeX XMLCite \textit{I. R. Dragomir} and \textit{A. Vlad}, Sci. Bull., Ser. A, Appl. Math. Phys., Politeh. Univ. Buchar. 79, No. 2, 207--222 (2017; Zbl 1513.94029)
Chen, Jiazhe; Li, Hexin; Wang, Beibei Improved chosen-plaintext DPA on block cipher SM4. (Chinese. English summary) Zbl 1413.68043 J. Tsinghua Univ., Sci. Technol. 57, No. 11, 1134-1138 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., J. Tsinghua Univ., Sci. Technol. 57, No. 11, 1134--1138 (2017; Zbl 1413.68043) Full Text: DOI
Faraoun, Kamel Mohammed On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction. (English) Zbl 1412.94172 Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 15, No. 1, 21-31 (2015). MSC: 94A60 68Q80 PDFBibTeX XMLCite \textit{K. M. Faraoun}, Ann. Univ. Mariae Curie-Skłodowska, Sect. A1, Inform. 15, No. 1, 21--31 (2015; Zbl 1412.94172) Full Text: DOI
Carlet, Claude; Alsalami, Yousuf A new construction of differentially 4-uniform \((n,n-1)\)-functions. (English) Zbl 1366.94481 Adv. Math. Commun. 9, No. 4, 541-565 (2015). MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{C. Carlet} and \textit{Y. Alsalami}, Adv. Math. Commun. 9, No. 4, 541--565 (2015; Zbl 1366.94481) Full Text: DOI
Markovski, Smile Design of crypto primitives based on quasigroups. (English) Zbl 1397.94088 Quasigroups Relat. Syst. 23, No. 1, 41-90 (2015). MSC: 94A60 20N05 68P25 PDFBibTeX XMLCite \textit{S. Markovski}, Quasigroups Relat. Syst. 23, No. 1, 41--90 (2015; Zbl 1397.94088)
Leporati, Alberto; Mariot, Luca Cryptographic properties of bipermutive cellular automata rules. (English) Zbl 1338.94078 J. Cell. Autom. 9, No. 5-6, 437-475 (2014). MSC: 94A60 68Q80 PDFBibTeX XMLCite \textit{A. Leporati} and \textit{L. Mariot}, J. Cell. Autom. 9, No. 5--6, 437--475 (2014; Zbl 1338.94078) Full Text: Link
Baumann, Ulrike; Franz, Elke; Pfitzmann, Andreas Cryptographic systems. (Kryptographische Systeme.) (German) Zbl 1330.94035 eXamen.press. Wiesbaden: Springer Vieweg (ISBN 978-3-642-45332-8/pbk; 978-3-642-45333-5/ebook). xi, 301 p. (2014). Reviewer: Ralph-Hardo Schulz (Berlin) MSC: 94A60 94-01 68P25 PDFBibTeX XMLCite \textit{U. Baumann} et al., Kryptographische Systeme. Wiesbaden: Springer Vieweg (2014; Zbl 1330.94035) Full Text: DOI
Cozzens, Margaret; Miller, Steven J. The mathematics of encryption. An elementary introduction. (English) Zbl 1284.94001 Mathematical World 29. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-8321-1/pbk; 978-1-4704-1594-5/ebook). xvii, 332 p. (2013). Reviewer: Herman J. Tiersma (Den Haag) MSC: 94-01 94A60 94Bxx 11T71 68P25 PDFBibTeX XMLCite \textit{M. Cozzens} and \textit{S. J. Miller}, The mathematics of encryption. An elementary introduction. Providence, RI: American Mathematical Society (AMS) (2013; Zbl 1284.94001) Full Text: DOI
Ristenpart, Thomas; Yilek, Scott The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries. (English) Zbl 1310.94167 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 392-409 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Ristenpart} and \textit{S. Yilek}, Lect. Notes Comput. Sci. 8042, 392--409 (2013; Zbl 1310.94167) Full Text: DOI
Takahashi, Junko; Fukunaga, Toshinori; Aoki, Kazumaro; Fuji, Hitoshi Highly accurate key extraction method for access-driven cache attacks using correlation coefficient. (English) Zbl 1316.94089 Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 286-301 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Takahashi} et al., Lect. Notes Comput. Sci. 7959, 286--301 (2013; Zbl 1316.94089) Full Text: DOI
Courtois, Nicolas T.; Misztal, Michał Aggregated differentials and cryptanalysis of PP-1 and GOST. (English) Zbl 1289.94049 Period. Math. Hung. 65, No. 2, 177-192 (2012). Reviewer: J. Żurawiecki (Lublin) MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{N. T. Courtois} and \textit{M. Misztal}, Period. Math. Hung. 65, No. 2, 177--192 (2012; Zbl 1289.94049) Full Text: DOI
Courtois, Nicolas T.; Gawinecki, Jerzy A.; Song, Guangyan Contradiction immunity and guess-then-determine attacks on GOST. (English) Zbl 1308.94066 Tatra Mt. Math. Publ. 53, 65-79 (2012). MSC: 94A60 68P25 90C27 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Tatra Mt. Math. Publ. 53, 65--79 (2012; Zbl 1308.94066) Full Text: DOI Link
Courtois, Nicolas T.; Sepehrdad, Pouyan; Sušil, Petr; Vaudenay, Serge ElimLin algorithm revisited. (English) Zbl 1282.94039 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 306-325 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Lect. Notes Comput. Sci. 7549, 306--325 (2012; Zbl 1282.94039) Full Text: DOI
Gilger, Johannes; Barnickel, Johannes; Meyer, Ulrike GPU-acceleration of block ciphers in the OpenSSL cryptographic library. (English) Zbl 1306.94055 Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 338-353 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Gilger} et al., Lect. Notes Comput. Sci. 7483, 338--353 (2012; Zbl 1306.94055) Full Text: DOI
Wang, Qingju; Bogdanov, Andrey The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers. (English) Zbl 1243.94031 Inf. Process. Lett. 112, No. 11, 427-432 (2012). MSC: 94A60 68M10 68P25 PDFBibTeX XMLCite \textit{Q. Wang} and \textit{A. Bogdanov}, Inf. Process. Lett. 112, No. 11, 427--432 (2012; Zbl 1243.94031) Full Text: DOI Link
Abdul-Latip, Shekh Faisal; Reyhanitabar, Mohammad Reza; Susilo, Willy; Seberry, Jennifer Fault analysis of the KATAN family of block ciphers. (English) Zbl 1291.94038 Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 319-336 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. F. Abdul-Latip} et al., Lect. Notes Comput. Sci. 7232, 319--336 (2012; Zbl 1291.94038) Full Text: DOI Link
Courtois, Nicolas T. Self-similarity attacks on block ciphers and application to KeeLoq. (English) Zbl 1285.94051 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 55-66 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. T. Courtois}, Lect. Notes Comput. Sci. 6805, 55--66 (2012; Zbl 1285.94051) Full Text: DOI
Courtois, Nicolas T.; Bard, Gregory V. Random permutation statistics and an improved slide-determine attack on KeeLoq. (English) Zbl 1285.94052 Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 35-54 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. T. Courtois} and \textit{G. V. Bard}, Lect. Notes Comput. Sci. 6805, 35--54 (2012; Zbl 1285.94052) Full Text: DOI
Glukhov, M. M. On mixing linear transforms for block ciphers. (Russian. English summary) Zbl 1475.94122 Mat. Vopr. Kriptografii 2, No. 2, 5-39 (2011). MSC: 94A60 68P25 05A05 PDFBibTeX XMLCite \textit{M. M. Glukhov}, Mat. Vopr. Kriptografii 2, No. 2, 5--39 (2011; Zbl 1475.94122) Full Text: DOI MNR
Bogdanov, Andrey; Shibutani, Kyoji Analysis of \(3\)-line generalized Feistel networks with double SD-functions. (English) Zbl 1260.68019 Inf. Process. Lett. 111, No. 13, 656-660 (2011). MSC: 68M10 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} and \textit{K. Shibutani}, Inf. Process. Lett. 111, No. 13, 656--660 (2011; Zbl 1260.68019) Full Text: DOI
Swapna, Sammireddy; Dileep, A. D.; Chandra Sekhar, C.; Kant, Shri Block cipher identification using support vector classification and regression. (English) Zbl 1217.94108 J. Discrete Math. Sci. Cryptography 13, No. 4, 305-318 (2010). MSC: 94A60 68T05 68T10 PDFBibTeX XMLCite \textit{S. Swapna} et al., J. Discrete Math. Sci. Cryptography 13, No. 4, 305--318 (2010; Zbl 1217.94108) Full Text: DOI Link
Bay, Asli; Nakahara, Jorge jun.; Vaudenay, Serge Cryptanalysis of reduced-round MIBS block cipher. (English) Zbl 1294.94033 Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 1-19 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Bay} et al., Lect. Notes Comput. Sci. 6467, 1--19 (2010; Zbl 1294.94033) Full Text: DOI Link
Baignères, Thomas; Sepehrdad, Pouyan; Vaudenay, Serge Distinguishing distributions using Chernoff information. (English) Zbl 1286.94043 Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 144-165 (2010). MSC: 94A17 94A60 60E15 62B10 68M12 PDFBibTeX XMLCite \textit{T. Baignères} et al., Lect. Notes Comput. Sci. 6402, 144--165 (2010; Zbl 1286.94043) Full Text: DOI Link
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo Some results on cryptanalysis of SMS4 block cipher. (English) Zbl 1195.94073 Int. J. Appl. Cryptogr. 2, No. 1, 60-67 (2010). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{W. Zhang} et al., Int. J. Appl. Cryptogr. 2, No. 1, 60--67 (2010; Zbl 1195.94073) Full Text: DOI
Nachef, Valérie; Patarin, Jacques; Treger, Joana Generic attacks on misty schemes. (English) Zbl 1285.94083 Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 222-240 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Nachef} et al., Lect. Notes Comput. Sci. 6212, 222--240 (2010; Zbl 1285.94083) Full Text: DOI
Paar, Christof; Pelzl, Jan Understanding cryptography. A textbook for students and practitioners. Foreword by Bart Preneel. (English) Zbl 1190.94029 Berlin: Springer (ISBN 978-3-642-04100-6/hbk; 978-3-642-04101-3/ebook). xviii, 372 p. (2010). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94A60 68P25 94-01 PDFBibTeX XMLCite \textit{C. Paar} and \textit{J. Pelzl}, Understanding cryptography. A textbook for students and practitioners. Foreword by Bart Preneel. Berlin: Springer (2010; Zbl 1190.94029) Full Text: DOI
Simion, Andrei Piling-up lemma for Markov chains. (English) Zbl 1240.60207 Proc. Rom. Acad., Ser. A, Math. Phys. Tech. Sci. Inf. Sci. 10, No. 2, 121-124 (2009). MSC: 60J10 11T71 68P25 PDFBibTeX XMLCite \textit{A. Simion}, Proc. Rom. Acad., Ser. A, Math. Phys. Tech. Sci. Inf. Sci. 10, No. 2, 121--124 (2009; Zbl 1240.60207)
Grošek, Otokar; Horák, Peter; Zajac, Pavol On complexity of round transformations. (English) Zbl 1190.94025 Discrete Math. 309, No. 18, 5527-5534 (2009). Reviewer: Jörg Desel (Eichstätt) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{O. Grošek} et al., Discrete Math. 309, No. 18, 5527--5534 (2009; Zbl 1190.94025) Full Text: DOI
Nakahara, Jorge jun.; Sepehrdad, Pouyan; Zhang, Bingsheng; Wang, Meiqin Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. (English) Zbl 1287.94088 Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 58-75 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Nakahara jun.} et al., Lect. Notes Comput. Sci. 5888, 58--75 (2009; Zbl 1287.94088) Full Text: DOI
Kaplan, Eyal; Naor, Moni; Reingold, Omer Derandomized constructions of \(k\)-wise (almost) independent permutations. (English) Zbl 1180.68200 Algorithmica 55, No. 1, 113-133 (2009). MSC: 68Q87 05A05 68W20 PDFBibTeX XMLCite \textit{E. Kaplan} et al., Algorithmica 55, No. 1, 113--133 (2009; Zbl 1180.68200) Full Text: DOI
Ping, Ping; Zhao, Xuelong; Zhang, Hong; Liu, Fengyu Encryption based on inverse iterating composition cellular automata system. (Chinese. English summary) Zbl 1199.68144 Acta Phys. Sin. 57, No. 10, 6188-6195 (2008). MSC: 68P25 68Q80 PDFBibTeX XMLCite \textit{P. Ping} et al., Acta Phys. Sin. 57, No. 10, 6188--6195 (2008; Zbl 1199.68144)
Courtois, Nicolas T.; Bard, Gregory V.; Wagner, David Algebraic and slide attacks on KeeLoq. (English) Zbl 1154.68388 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 97-115 (2008). MSC: 68P25 68W30 94A60 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Lect. Notes Comput. Sci. 5086, 97--115 (2008; Zbl 1154.68388) Full Text: DOI
Selçuk, Ali Aydın On probability of success in linear and differential cryptanalysis. (English) Zbl 1147.68510 J. Cryptology 21, No. 1, 131-147 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. A. Selçuk}, J. Cryptology 21, No. 1, 131--147 (2008; Zbl 1147.68510) Full Text: DOI Link
Kim, Jongsung; Hong, Seokhie; Preneel, Bart Related-key rectangle attacks on reduced AES-192 and AES-256. (English) Zbl 1186.94455 Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 225-241 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 4593, 225--241 (2007; Zbl 1186.94455) Full Text: DOI
Seurin, Yannick; Peyrin, Thomas Security analysis of constructions combining FIL random oracles. (English) Zbl 1186.94470 Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 119-136 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Seurin} and \textit{T. Peyrin}, Lect. Notes Comput. Sci. 4593, 119--136 (2007; Zbl 1186.94470) Full Text: DOI
Courtois, Nicolas T.; Bard, Gregory V. Algebraic cryptanalysis of the data encryption standard. (English) Zbl 1154.94386 Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 152-169 (2007). MSC: 94A60 68P25 68W30 PDFBibTeX XMLCite \textit{N. T. Courtois} and \textit{G. V. Bard}, Lect. Notes Comput. Sci. 4887, 152--169 (2007; Zbl 1154.94386) Full Text: DOI
Daemen, Joan; Rijmen, Vincent Probability distributions of correlation and differentials in block ciphers. (English) Zbl 1211.94028 J. Math. Cryptol. 1, No. 3, 221-242 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, J. Math. Cryptol. 1, No. 3, 221--242 (2007; Zbl 1211.94028) Full Text: DOI
Jakimoski, Goce Some notes on the security of the timed efficient stream loss-tolerant authentication scheme. (English) Zbl 1161.68441 Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 342-357 (2007). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{G. Jakimoski}, Lect. Notes Comput. Sci. 4356, 342--357 (2007; Zbl 1161.68441) Full Text: DOI
Peyrin, Thomas; Gilbert, Henri; Muller, Frédéric; Robshaw, Matt Combining compression functions and block cipher-based hash functions. (English) Zbl 1172.94596 Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 315-331 (2006). MSC: 94A60 68P30 PDFBibTeX XMLCite \textit{T. Peyrin} et al., Lect. Notes Comput. Sci. 4284, 315--331 (2006; Zbl 1172.94596) Full Text: DOI
Courtois, Nicolas T.; Debraize, Blandine; Garrido, Eric On exact algebraic [non-]immunity of s-boxes based on power functions. (English) Zbl 1176.94036 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 76-86 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{N. T. Courtois} et al., Lect. Notes Comput. Sci. 4058, 76--86 (2006; Zbl 1176.94036) Full Text: DOI
Grošek, Otakar; Magliveras, Spyros S.; Ťapuška, Ján; Wei, Wandi Is Rijndael really independent of the field polynomial? (English) Zbl 1174.68406 Tatra Mt. Math. Publ. 33, 51-69 (2006). Reviewer: Serweciński, Marcin (Katovice) MSC: 68P25 12E99 PDFBibTeX XMLCite \textit{O. Grošek} et al., Tatra Mt. Math. Publ. 33, 51--69 (2006; Zbl 1174.68406)
Xiao, Lu; Heys, Howard M. A simple power analysis attack against the key schedule of the Camellia block cipher. (English) Zbl 1192.68246 Inf. Process. Lett. 95, No. 3, 409-412 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{L. Xiao} and \textit{H. M. Heys}, Inf. Process. Lett. 95, No. 3, 409--412 (2005; Zbl 1192.68246) Full Text: DOI
Joo, Min-Kyu; Choi, Yoon-Hwa A fault-tolerant pipelined architecture for symmetric block ciphers. (English) Zbl 1100.68516 Comput. Electr. Eng. 31, No. 6, 380-390 (2005). MSC: 68M15 68P25 68M99 PDFBibTeX XMLCite \textit{M.-K. Joo} and \textit{Y.-H. Choi}, Comput. Electr. Eng. 31, No. 6, 380--390 (2005; Zbl 1100.68516) Full Text: DOI
Billet, Olivier; Gilbert, Henri; Ech-Chatbi, Charaf Cryptanalysis of a white box AES implementation. (English) Zbl 1117.94310 Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 227-240 (2005). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{O. Billet} et al., Lect. Notes Comput. Sci. 3357, 227--240 (2005; Zbl 1117.94310) Full Text: DOI
Pareek, N. K.; Patidar, Vinod; Sud, K. K. Cryptography using multiple one-dimensional chaotic maps. (English) Zbl 1075.68027 Commun. Nonlinear Sci. Numer. Simul. 10, No. 7, 715-723 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{N. K. Pareek} et al., Commun. Nonlinear Sci. Numer. Simul. 10, No. 7, 715--723 (2005; Zbl 1075.68027) Full Text: DOI
Grošek, Otokar; Miller, Mirka; Ryan, Joe On non-polynomiality of XOR over \(\mathbb Z_2^n\). (English) Zbl 1113.68047 Tatra Mt. Math. Publ. 29, 183-191 (2004). MSC: 68P25 05B15 PDFBibTeX XMLCite \textit{O. Grošek} et al., Tatra Mt. Math. Publ. 29, 183--191 (2004; Zbl 1113.68047)
Lucks, Stefan Ciphers secure against related-key attacks. (English) Zbl 1079.68552 Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 359-370 (2004). MSC: 68P25 94A60 68N99 PDFBibTeX XMLCite \textit{S. Lucks}, Lect. Notes Comput. Sci. 3017, 359--370 (2004; Zbl 1079.68552) Full Text: DOI
Bellare, Mihir; Kohno, Tadayoshi A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. (English) Zbl 1038.94520 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 491-506 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Bellare} and \textit{T. Kohno}, Lect. Notes Comput. Sci. 2656, 491--506 (2003; Zbl 1038.94520) Full Text: Link
Biryukov, Alex; De Cannière, Christophe; Braeken, An; Preneel, Bart A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521 Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003). MSC: 94A60 68P25 94A17 PDFBibTeX XMLCite \textit{A. Biryukov} et al., Lect. Notes Comput. Sci. 2656, 33--50 (2003; Zbl 1038.94521) Full Text: Link
Iwata, Tetsu; Kurosawa, Kaoru On the universal hash functions in Luby-Rackoff cipher. (English) Zbl 1031.94518 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 226-236 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2587, 226--236 (2003; Zbl 1031.94518) Full Text: Link
Phan, Raphael Chung-Wei; Furuya, Soichi Sliding properties of the DES key schedule and potential extensions to the slide attacks. (English) Zbl 1031.94525 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 138-148 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. C. W. Phan} and \textit{S. Furuya}, Lect. Notes Comput. Sci. 2587, 138--148 (2003; Zbl 1031.94525) Full Text: Link
Zheng, Yuliang; Zhang, Xian-Mo Connections among nonlinearity, avalanche and correlation immunity. (English) Zbl 1026.68052 Theor. Comput. Sci. 292, No. 3, 697-710 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{Y. Zheng} and \textit{X.-M. Zhang}, Theor. Comput. Sci. 292, No. 3, 697--710 (2003; Zbl 1026.68052) Full Text: DOI
Lin, Chu-Hsing; Yeh, Yi-Shiung Generalized GOST. (English) Zbl 1048.94012 J. Inf. Optim. Sci. 23, No. 2, 345-353 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C.-H. Lin} and \textit{Y.-S. Yeh}, J. Inf. Optim. Sci. 23, No. 2, 345--353 (2002; Zbl 1048.94012) Full Text: DOI
Halevi, Shai; Coppersmith, Don; Jutla, Charanjit Scream: A software-efficient stream cipher. (English) Zbl 1045.94519 Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 195-209 (2002). MSC: 94A60 68N99 68P25 PDFBibTeX XMLCite \textit{S. Halevi} et al., Lect. Notes Comput. Sci. 2365, 195--209 (2002; Zbl 1045.94519) Full Text: Link
Knudsen, Lars; Wagner, David Integral cryptanalysis. (English) Zbl 1045.94527 Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 112-127 (2002). MSC: 94A60 68N99 68P25 PDFBibTeX XMLCite \textit{L. Knudsen} and \textit{D. Wagner}, Lect. Notes Comput. Sci. 2365, 112--127 (2002; Zbl 1045.94527) Full Text: Link
Vaudenay, Serge Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. (English) Zbl 1056.94517 Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 534-545 (2002). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 2332, 534--545 (2002; Zbl 1056.94517) Full Text: Link
Canteaut, Anne; Videau, Marion Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. (English) Zbl 1056.94512 Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 518-533 (2002). MSC: 94A60 68P25 94A55 06E30 PDFBibTeX XMLCite \textit{A. Canteaut} and \textit{M. Videau}, Lect. Notes Comput. Sci. 2332, 518--533 (2002; Zbl 1056.94512) Full Text: Link
Coron, Jean-Sébastien; Handschuh, Helena; Joye, Marc; Paillier, Pascal; Pointcheval, David; Tymen, Christophe GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504 Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 2271, 263--276 (2002; Zbl 1048.94504) Full Text: Link
Liskov, Moses; Rivest, Ronald L.; Wagner, David Tweakable block ciphers. (English) Zbl 1026.94533 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 31-46 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Liskov} et al., Lect. Notes Comput. Sci. 2442, 31--46 (2002; Zbl 1026.94533) Full Text: Link
Naor, Moni; Reingold, Omer Constructing pseudo-random permutations with a prescribed structure. (English) Zbl 0999.94027 J. Cryptology 15, No. 2, 97-102 (2002). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 68P25 65C10 PDFBibTeX XMLCite \textit{M. Naor} and \textit{O. Reingold}, J. Cryptology 15, No. 2, 97--102 (2002; Zbl 0999.94027) Full Text: DOI
Daemen, Joan; Rijmen, Vincent The design of Rijndael. AES – the Advanced Encryption Standard. (English) Zbl 1065.94005 Berlin: Springer (ISBN 3-540-42580-2/hbk). xvii, 238 p. (2002). MSC: 94A60 68P25 68-01 94-01 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, The design of Rijndael. AES -- the Advanced Encryption Standard. Berlin: Springer (2002; Zbl 1065.94005) Full Text: Link
Nakahara, Jorge jun.; Preneel, Bart; Vandewalle, Joos Linear cryptanalysis of reduced-round versions of the SAFER block cipher family. (English) Zbl 0994.68507 Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 244-261 (2001). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Nakahara jun.} et al., Lect. Notes Comput. Sci. 1978, 244--261 (2001; Zbl 0994.68507)
Desai, Anand The security of all-or-nothing encryption: Protecting against exhaustive key search. (English) Zbl 0995.94539 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 359-375 (2000). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{A. Desai}, Lect. Notes Comput. Sci. 1880, 359--375 (2000; Zbl 0995.94539)
van Tilborg, Henk C. A. Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM. (English) Zbl 0991.94002 The Kluwer International Series in Engineering and Computer Science. 528. Dordrecht: Kluwer Academic Publishers. xiv, 491 p. (2000). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94-02 68-02 94A60 68P25 94A62 94A55 PDFBibTeX XMLCite \textit{H. C. A. van Tilborg}, Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM. Dordrecht: Kluwer Academic Publishers (2000; Zbl 0991.94002)
Moriai, Shiho; Vaudenay, Serge On the pseudorandomness of top-level schemes of block ciphers. (English) Zbl 0966.94013 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 289-302 (2000). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Moriai} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 1976, 289--302 (2000; Zbl 0966.94013)
Inoue, Toru; Sakurai, Kouichi Making hash functions from block ciphers secure and efficient by using convolutional codes. (English) Zbl 0969.94017 Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 391-404 (2000). MSC: 94A60 68P25 94B10 PDFBibTeX XMLCite \textit{T. Inoue} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1751, 391--404 (2000; Zbl 0969.94017)
Iwata, Tetsu; Kurosawa, Kaoru Inclusion relations of Boolean functions satisfying \(\text{PC}(l)\) of order \(k\). (English) Zbl 1014.94554 Ding, C. (ed.) et al., Sequences and their applications. Proceedings of the international conference, SETA ’98, Singapore, December 14-17, 1998. London: Springer. Springer Series in Discrete Mathematics and Theoretical Computer Science. 263-272 (1999). MSC: 94A60 68P25 06E30 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, in: Sequences and their applications. Proceedings of the international conference, SETA '98, Singapore, December 14--17, 1998. London: Springer. 263--272 (1999; Zbl 1014.94554)
Boyko, Victor On the security properties of OAEP as an all-or-nothing transform. (English) Zbl 0942.94017 Wiener, Michael (ed.), Advances in cryptology - CRYPTO ’99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1666, 503-518 (1999). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Boyko}, Lect. Notes Comput. Sci. 1666, 503--518 (1999; Zbl 0942.94017)
Patel, Sarvar; Ramzan, Zulfikar; Sundaram, Ganapathy S. Towards making Luby-Rackoff ciphers optimal and practical. (English) Zbl 0942.94023 Knudsen, Lars (ed.), Fast software encryption. 6th international workshop, FSE ‘99. Rome, Italy, March 24-26, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1636, 171-185 (1999). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Patel} et al., Lect. Notes Comput. Sci. 1636, 171--185 (1999; Zbl 0942.94023)
Lipmaa, Helger IDEA: A cipher for multimedia architectures? (English) Zbl 0933.68053 Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 248-263 (1999). MSC: 68P25 PDFBibTeX XMLCite \textit{H. Lipmaa}, Lect. Notes Comput. Sci. 1556, 248--263 (1999; Zbl 0933.68053)
Naor, Moni; Reingold, Omer On the construction of pseudorandom permutations: Luby-Rackoff revisited. (English) Zbl 0936.94010 J. Cryptology 12, No. 1, 29-66 (1999). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 68P25 65C10 PDFBibTeX XMLCite \textit{M. Naor} and \textit{O. Reingold}, J. Cryptology 12, No. 1, 29--66 (1999; Zbl 0936.94010) Full Text: DOI
Preneel, Bart; Rijmen, Vincent; Bosselaers, Antoon Recent developments in the design of conventional cryptographic algorithms. (English) Zbl 0955.94016 Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Preneel} et al., Lect. Notes Comput. Sci. 1528, 105--130 (1998; Zbl 0955.94016)
Jutla, Charanjit S. Generalized birthday attacks on unbalanced Feistel networks. (English) Zbl 0931.94028 Krawczyk, Hugo (ed.), Advances in cryptology - CRYPTO ’98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23–27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1462, 186-199 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. S. Jutla}, Lect. Notes Comput. Sci. 1462, 186--199 (1998; Zbl 0931.94028)
Chabaud, Florent; Joux, Antoine Differential collisions in SHA-0. (English) Zbl 0938.68036 Krawczyk, Hugo (ed.), Advances in cryptology - CRYPTO ’98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23-27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1462, 56-71 (1998). MSC: 68P25 PDFBibTeX XMLCite \textit{F. Chabaud} and \textit{A. Joux}, Lect. Notes Comput. Sci. 1462, 56--71 (1998; Zbl 0938.68036)
Wu, Hongjun; Bao, Feng; Deng, Robert H.; Ye, Qin-Zhong Cryptanalysis of Rijmen-Preneel trapdoor ciphers. (English) Zbl 0987.94510 Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18-22, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1514, 126-132 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Wu} et al., Lect. Notes Comput. Sci. 1514, 126--132 (1998; Zbl 0987.94510)
Damgård, Ivan B.; Knudsen, Lars R. Two-key triple encryption. (English) Zbl 0920.94006 J. Cryptology 11, No. 3, 209-218 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{I. B. Damgård} and \textit{L. R. Knudsen}, J. Cryptology 11, No. 3, 209--218 (1998; Zbl 0920.94006) Full Text: DOI
Biham, Eli Cryptanalysis of multiple modes of operation. (English) Zbl 0902.94013 J. Cryptology 11, No. 1, 45-58 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Biham}, J. Cryptology 11, No. 1, 45--58 (1998; Zbl 0902.94013) Full Text: DOI
Shimoyama, Takeshi; Amada, Seiichi; Moriai, Shiho Improved fast software implementation of block ciphers. (Extended abstract). (English) Zbl 0888.94022 Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 269-273 (1997). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Shimoyama} et al., Lect. Notes Comput. Sci. 1334, 269--273 (1997; Zbl 0888.94022)
Mitchell, C. J.; Piper, F. C.; Walker, M.; Wild, P. Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes. (English) Zbl 0864.94022 Des. Codes Cryptography 7, No. 1-2, 101-110 (1996). Reviewer: G.Eigenthaler (Wien) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. J. Mitchell} et al., Des. Codes Cryptography 7, No. 1--2, 101--110 (1996; Zbl 0864.94022) Full Text: DOI
Heys, Howard M.; Tavares, Stafford E. Avalanche characteristics of substitution-permutation encryption networks. (English) Zbl 1055.68541 IEEE Trans. Comput. 44, No. 9, 1131-1139 (1995). MSC: 68P25 PDFBibTeX XMLCite \textit{H. M. Heys} and \textit{S. E. Tavares}, IEEE Trans. Comput. 44, No. 9, 1131--1139 (1995; Zbl 1055.68541) Full Text: DOI Link
Long, Yonghong A general method for constructing public key block ciphers of no data expansion. (Chinese. English summary) Zbl 0815.94008 Nat. Sci. J. Xiangtan Univ. 16, No. 3, 137-140 (1994). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Long}, Nat. Sci. J. Xiangtan Univ. 16, No. 3, 137--140 (1994; Zbl 0815.94008)
Lai, Xuejia; Massey, James L. Hash functions based on block ciphers. (English) Zbl 0801.68046 Rueppel, Rainer A. (ed.), Advances in cryptology – EUROCRYPT ’92. Workshop on the theory and applications of cryptographic techniques, Balatonfüred, Hungary, May 24-28, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 658, 55-70 (1993). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{X. Lai} and \textit{J. L. Massey}, Lect. Notes Comput. Sci. 658, 55--70 (1993; Zbl 0801.68046)