Cryptography Reference
In-Depth Information
Computer Science, Vol. 1008. (Springer-Verlag, Berlin, 1995); http://iteseer.ist.psu.edu/knud-
sen95truncated.html .
[10] Kenji Koyama and Routo Terada. How to strengthen des-like cryptosystems against differential cryptana-
lysis. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences E76-A (1):
63-69 (1993).
[11] Xuejia Lai. Higher order derivatives and differential cryptanalysis. In Proceedings of Symposium on Com-
munication, Coding and Cryptography (Monte-Vina, Ascona, Switzerland, 1994).
[12] S. K. Langford and M. E. Hellman. Differential-linear cryptanalysis. In Advances in Cryptology - Crypto
'94, (ed. Yvo Desmedt), pp. 17-25. Lecture Notes in Computer Science, Vol. 839. (Springer-Verlag, Berlin,
1994).
[13] R. C. Merkle. Fast software encryption functions. In Advances in Cryptology - Crypto '90, (eds. Alfred J.
Menezes and Scott A. Vanstone), pp. 476-501. Lecture Notes in Computer Science, Vol. 537. (Springer-Verlag,
Berlin, 1990).
[14] Shiho Moriai and Yiqun Lisa Yin. Cryptanalysis of Twofish (II); http://www.schneier.com/
twofish-analysis-shiho.pdf .
[15] K. Nyberg and L. R. Knudsen. Provable security against differential cryptanalysis. In Advances in Crypto-
logy - Crypto '92, (ed. Ernest F. Brickell), pp. 566-574. Lecture Notes in Computer Science, Vol. 740.
(Springer-Verlag, Berlin, 1992).
[16] Bruce Schneier. Twofish Cryptanalysis Rumors. (2005); http://www.schneier.com/blog/
archives/2005/11/twofish_cryptan.html .
[17] Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. The Twofish
Encryption Algorithm: A 128-Bit Block Cipher. (John Wiley, New York, 1999).
[18] S. Vaudenay. Provable security for block ciphers by decorrelation. In STACS 98: 15th Annual Symposium
on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings, (eds. Michel
Morvan, Christoph Meniel, and Daniel Krob). Lecture Notes in Computer Science, Vol. 1373. (Springer-Verlag,
Berlin, 1998).
[19] U.S. Government. SKIPJACK and KEA Algorithm Specifications. (1998).
[20] David Wagner. The boomerang attack. In Fast Software Encryption: 6th Interntional Workshop, FSE '99,
(ed. Lars R. Knudsen), pp. 156-170. Lecture Notes in Computer Science, Vol. 1636. (Springer-Verlag, Berlin,
1999);
http://citeseer.ist.psu.edu/wagner99boomerang.html .
Search WWH ::




Custom Search