Cryptography Reference
In-Depth Information
24. Massey, J., Khachatrian, G., Kuregian, M.: Nomination of SAFER++ as Candidate
Algorithm for the New European Schemes for Signatures, Integrity, and Encryption
(NESSIE). In: First Open NESSIE Workshop (November 2000)
25. Mendel, F., Rechberger, C., Schlaffer, M., Thomsen, S.S.: The Rebound Attack:
Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE
2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
26. Minier, M., Phan, R.C.-W., Pousse, B.: Distinguishers for Ciphers and Known Key
Attack against Rijndael with Large Blocks. In: Preneel, B. (ed.) AFRICACRYPT
2009. LNCS, vol. 5580, pp. 60-76. Springer, Heidelberg (2009)
27. Preneel, B., Govaerts, R., Vandewalle, J.: Hash Functions Based on Block Ciphers:
A Synthetic Approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773,
pp. 368-378. Springer, Heidelberg (1994)
28. Toshiba Corporation. Specification of Hierocrypt-3. submitted to the First Open
NESSIE Workshop, Leuven, Belgium (November 13-14, 2000)
A
Differential Trails for Crypton, Hierocrypt-3,
SAFER++ and Square
Fig. 4. Truncated differential trail for 9 rounds of Crypton for chosen-key distinguisher
and 256-bit key
Fig. 5. Truncated differential trail for 4.5 rounds of Hierocrypt for chosen-key distin-
guisher and 256-bit key
 
Search WWH ::




Custom Search