Cryptography Reference
In-Depth Information
[175] J. Stern. La Science du Secret . Odile Jacob, Paris, 1998.
[176] J. Stern, S. Vaudenay. CS-Cipher. In Fast Software Encryption'98 , Paris, France, Lecture
Notes in Computer Science 1372. Springer-Verlag, NY, 1998, pp. 189-205.
[177] D.R. Stinson. Cryptography, Theory and Practice (2nd Edition). CRC, NY, 2002. French
version: Cryptographie, Theorie et Pratique , Vuibert, Paris, 2003.
[178] A. Tardy-Corfdir, H. Gilbert. A Known Plaintext Attack of FEAL-4 and FEAL-6. In
Advances in Cryptology CRYPTO'91 , Santa Barbara, CA, Lecture Notes in Computer
Science 576. Springer-Verlag, NY, 1992, pp. 172-181.
[179] S. Vaudenay. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In
Fast Software Encryption'95 , Leuven, Belgium, Lecture Notes in Computer Science 1008.
Springer-Verlag, NY, 1995, pp. 286-297.
[180] S. Vaudenay. Hidden Collisions on DSS. In Advances in Cryptology CRYPTO'96 , Santa
Barbara, CA, Lecture Notes in Computer Science 1109. Springer-Verlag, NY, 1996, pp.
83-88.
[181] S. Vaudenay. On the Security of CS-Cipher. In Fast Software Encryption'99 , Roma, Italy,
Lecture Notes in Computer Science 1636. Springer-Verlag, NY, 1999, 260-274.
[182] S. Vaudenay. Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC,
WTLS. In Advances in Cryptology EUROCRYPT'02 , Amsterdam, Netherlands, Lecture
Notes in Computer Science 2332. Springer-Verlag, NY, 2002, pp. 534-545.
[183] S. Vaudenay. Decorrelation: A Theory for Block Cipher Security. Journal of Cryptology ,
vol. 16, pp. 249-286, 2003.
[184] M.N. Wegman, J.L. Carter. New Hash Functions and Their Use in Authentication and Set
Equality. Journal of Computer and System Sciences , vol. 22, pp. 265-279, 1981.
[185] M.J. Wiener. Cryptanalysis of Short RSA Secret Exponents. IEEE Transactions on Infor-
mation Theory , vol. IT-36, pp. 553-558, 1990.
Search WWH ::




Custom Search