Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
DES has no per round linear factors
Proceedings of CRYPTO 84 on Advances in cryptology
Propagation characteristics of the DES
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Fast correlation attacks: methods and countermeasures
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Analysis of step-reduced SHA-256
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Biclique cryptanalysis of the full AES
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Construction of highly nonlinear resilient S-boxes with given degree
Designs, Codes and Cryptography
Hi-index | 0.00 |