| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Block Cipher Cryptanalysis
New Results on Boomerang and Rectangle Attacks
Multiplicative Differentials
Differential and Linear Cryptanalysis of a Reduced-Rouna SC2000
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
Improved Cryptanalysis of MISTY1
Multiple Linear Cryptanalysis of a Reduced Round RC6
Integral Cryptanalysis
On the Security of CAMELLIA against the Square Attack
Saturation Attacks on Reduced-Round Skipjack
Integral Cryptanalysis
Block Cipher Theory
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia
The Round Functions of RIJNDAEL Generate the Alternating Group
Non-cryptographic Primitive for Pseudorandom Permutation
Stream Cipher Design
BeepBeep: Embedded Real-Time Encryption
A New Keystream Generator MUGI
Scream: A Software-Efficient Stream Cipher
Stream Cipher Cryptanalysis
Distinguishing Attacks on SOBER-t16 and t32
Linearity Properties of the SOBER-t32 Key Loading
A Time-Memory Tradeoff Attack against LILI-128
Odds and Ends
On the Security of Randomized CBC-MAC beyond the Birthday Paradox Limit: A New Construction
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98
……
Author Index