Tài liệu tham khảo |
Loại |
Chi tiết |
4. U.S. Department of Commerce, National Institute of Standards and Technology:Specification for the ADVANCED ENCRYPTION STANDARD (AES) (Federal Information Processing Standards Publication 197) (2001) |
Sách, tạp chí |
Tiêu đề: |
Specification for the ADVANCED ENCRYPTION STANDARD (AES) |
Tác giả: |
U.S. Department of Commerce, National Institute of Standards and Technology |
Nhà XB: |
Federal Information Processing Standards Publication |
Năm: |
2001 |
|
6. Rijmen, V., Barreto, P.S.L.M.: The WHIRLPOOL hashing function. Submitted to NISSIE (September 2000) |
Sách, tạp chí |
Tiêu đề: |
The WHIRLPOOL hashing function |
Tác giả: |
Rijmen, V., Barreto, P.S.L.M |
Nhà XB: |
NISSIE |
Năm: |
2000 |
|
7. Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S.: Grứstl addendum. Submission to NIST (updated) (2009) |
Sách, tạp chí |
Tiêu đề: |
Grứstl addendum |
Tác giả: |
Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S |
Nhà XB: |
NIST |
Năm: |
2009 |
|
8. Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 proposal: ECHO. Submission to NIST (updated) (2009) 9. Biham, E., Dunkelman, O.: The SHAvite-3 hash function. Submission to NIST(Round 2) (2009) |
Sách, tạp chí |
Tiêu đề: |
SHA-3 proposal: ECHO |
Tác giả: |
Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y |
Nhà XB: |
NIST |
Năm: |
2009 |
|
10. Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In:Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315–324. Springer, Heidelberg (2007) |
Sách, tạp chí |
Tiêu đề: |
Known-key distinguishers for some block ciphers |
Tác giả: |
Knudsen, L.R., Rijmen, V |
Nhà XB: |
Springer |
Năm: |
2007 |
|
12. Mendel, F., Peyrin, T., Rechberger, C., Schl¨ affer, M.: Improved cryptanalysis of the reduced Grứstl compression function, ECHO permutation and AES block ci- pher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16–35. Springer, Heidelberg (2009) |
Sách, tạp chí |
Tiêu đề: |
Improved cryptanalysis of the reduced Grứstl compression function, ECHO permutation and AES block cipher |
Tác giả: |
F. Mendel, T. Peyrin, C. Rechberger, M. Schl¨ affer |
Nhà XB: |
Springer |
Năm: |
2009 |
|
13. Gilbert, H., Peyrin, T.: Super-sbox cryptanalysis: Improved attacks for AES-like permutations. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 365–383. Springer, Heidelberg (2010) |
Sách, tạp chí |
Tiêu đề: |
Super-sbox cryptanalysis: Improved attacks for AES-like permutations |
Tác giả: |
H. Gilbert, T. Peyrin |
Nhà XB: |
Springer |
Năm: |
2010 |
|
16. Naya-Plasencia, M.: Scrutinizing rebound attacks: new algorithms for improving the complexities. Cryptology ePrint Archive, Report 2010/607 (2010),http://eprint.iacr.org/2010/607 |
Sách, tạp chí |
Tiêu đề: |
Scrutinizing rebound attacks: new algorithms for improving the complexities |
Tác giả: |
María Naya-Plasencia |
Nhà XB: |
Cryptology ePrint Archive |
Năm: |
2010 |
|
19. Peyrin, T.: Improved cryptanalysis of ECHO and Grứstl. Cryptology ePrint Archive, Report 2010/223 (2010), http://eprint.iacr.org/2010/223Full ver- sion of CRYPTO 2010 |
Sách, tạp chí |
Tiêu đề: |
Improved cryptanalysis of ECHO and Grứstl |
Tác giả: |
Peyrin, T |
Nhà XB: |
Cryptology ePrint Archive |
Năm: |
2010 |
|
5. Daemen, J., Rijmen, V.: The design of Rijndeal: AES – the Advanced Encryption Standard (AES). Springer, Heidelberg (2002) |
Khác |
|
11. Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S.: The rebound attack:Cryptanalysis of reduced whirlpool and Grứstl. In: Dunkelman, O. (ed.) FSE 2009.LNCS, vol. 5665, pp. 260–276. Springer, Heidelberg (2009) |
Khác |
|
17. Wu, S., Feng, D., Wu, W., Su, B.: Hyper-sbox view of AES-like permutations:A generalized distinguisher. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010.LNCS, vol. 6584, pp. 155–168. Springer, Heidelberg (2011) |
Khác |
|
18. Sasaki, Y., Li, Y., Wang, L., Sakiyama, K., Ohta, K.: Non-full-active super-sbox analysis: Applications to ECHO and grứstl. In: Abe, M. (ed.) ASIACRYPT 2010.LNCS, vol. 6477, pp. 38–55. Springer, Heidelberg (2010) |
Khác |
|
20. Peyrin, T.: Improved differential attacks for ECHO and Grứstl. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 370–392. Springer, Heidelberg (2010) |
Khác |
|