| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Cryptanalysis of Block Ciphers I
The Saturation Attack-A Bait for Twofish
Linear Cryptanalysis of Reduced Round Serpent
Cryptanalysis of the Mercy Block Cipher
Hash Functions and Boolean Functions
Producing Collisions for PANAMA
The RIPEMDn and RIPEMDR Improved Variants of MD4 Are Not Collision Free
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity
Modes of Operations
Optimized Self-Synchronizing Mode of Operation
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
IncrementM Unforgeable Encryption
Cryptanalysis of Stream Ciphers I
ZIP Attacks with Reduced Known Plaintext
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
Cryptanalysis of SBLH
A Practical Attack on Broadcast RC4
Cryptanalysis of Block Ciphers II
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
Differential Cryptanalysis of Q
Differential Cryptanalysis of Nimbus
Cryptanalysis of Stream Ciphers II
Fast Correlation Attack Algorithm with List Decoding and an Application
Bias in the LEVIATHAN Stream Cipher
Analysis of SSC2
Pse udo-Randomness
Round Security and Super-Pseudorandomness of MISTY Type Structure
New Results on the Pseudorandomness of Some Blockcipher Constructions
FSE 2001 Special Talk
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
Cryptanalysis of Block Ciphers III
Related Key Attacks on Reduced Round KASUMI
……
Design and Evaluation
Author Index