Serpent: A New Block Cipher Proposal (1998)

Cached

Download Links

by Eli Biham , Ross Anderson , Lars Knudsen
Venue:In Fast Software Encryption ’98
Citations:34 - 4 self

Documents Related by Co-Citation

417 Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems – Paul C. Kocher - 1996
426 Linear Cryptanalysis Method of DES Cipher – M Matsui - 1994
60 A Fast New DES Implementation in Software – Eli Biham - 1997
335 Differential Cryptanalysis of the Data Encryption Standard – Eli Biham, Adi Shamir - 1993
665 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
5 Hiroshi Miyauchi. Cryptanalysis of DES implemented on computers with cache – Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri - 2003
56 Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel – D. Page - 2002
80 Side Channel Cryptanalysis of Product Ciphers – John Kelsey , Bruce Schneier, David Wagner, Chris Hall - 1998
76 Cache-timing attacks on AES – Daniel J. Bernstein - 2005
20 Advances on access-driven cache attacks on AES – M Neve, J Seifert - 2006
20 A refined look at bernstein’s AES sidechannel analysis – M Neve, J Seifert, Z Wang - 2006
80 Cache Attacks and Countermeasures: the Case of AES – Dag Arne Osvik, Adi Shamir, Eran Tromer - 2005
195 Cryptanalysis of block ciphers with overdefined systems of equations – Nicolas T. Courtois, Josef Pieprzyk - 2002
59 Higher order derivatives and differential cryptanalysis, Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., Eds – X Lai - 1994
14 A timing attack against Rijndael – Francois Koeune, Francois Koeune, Jean-Jacques Quisquater, Jean-jacques Quisquater - 1999
63 Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis – Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, A+ Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita - 2000
32 A space/time trade-off in exhaustive search attacks on stream ciphers – S Babbage - 1995
5 Resistance of SNOW 2.0 against algebraic attacks – Olivier Billet, Henri Gilbert, France Télécom - 2004
88 Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers – Alex Biryukov, Adi Shamir - 1976