Cryptography Reference
In-Depth Information
[175] J. Stern.
La Science du Secret
. Odile Jacob, Paris, 1998.
[176] J. Stern, S. Vaudenay. CS-Cipher. In
Fast Software Encryption'98
, Paris, France, Lecture
Notes in Computer Science 1372. Springer-Verlag, NY, 1998, pp. 189-205.
[177] D.R. Stinson.
Cryptography, Theory and Practice
(2nd Edition). CRC, NY, 2002. French
version:
Cryptographie, Theorie et Pratique
, Vuibert, Paris, 2003.
[178] A. Tardy-Corfdir, H. Gilbert. A Known Plaintext Attack of FEAL-4 and FEAL-6. In
Advances in Cryptology CRYPTO'91
, Santa Barbara, CA, Lecture Notes in Computer
Science 576. Springer-Verlag, NY, 1992, pp. 172-181.
[179] S. Vaudenay. On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In
Fast Software Encryption'95
, Leuven, Belgium, Lecture Notes in Computer Science 1008.
Springer-Verlag, NY, 1995, pp. 286-297.
[180] S. Vaudenay. Hidden Collisions on DSS. In
Advances in Cryptology CRYPTO'96
, Santa
Barbara, CA, Lecture Notes in Computer Science 1109. Springer-Verlag, NY, 1996, pp.
83-88.
[181] S. Vaudenay. On the Security of CS-Cipher. In
Fast Software Encryption'99
, Roma, Italy,
Lecture Notes in Computer Science 1636. Springer-Verlag, NY, 1999, 260-274.
[182] S. Vaudenay. Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC,
WTLS. In
Advances in Cryptology EUROCRYPT'02
, Amsterdam, Netherlands, Lecture
Notes in Computer Science 2332. Springer-Verlag, NY, 2002, pp. 534-545.
[183] S. Vaudenay. Decorrelation: A Theory for Block Cipher Security.
Journal of Cryptology
,
vol. 16, pp. 249-286, 2003.
[184] M.N. Wegman, J.L. Carter. New Hash Functions and Their Use in Authentication and Set
Equality.
Journal of Computer and System Sciences
, vol. 22, pp. 265-279, 1981.
[185] M.J. Wiener. Cryptanalysis of Short RSA Secret Exponents.
IEEE Transactions on Infor-
mation Theory
, vol. IT-36, pp. 553-558, 1990.