Recent Developments in the Design of Conventional Cryptographic Algorithms (1998)

by Bart Preneel , Vincent Rijmen , Antoon Bosselaers
Venue:Computer Security and Industrial Cryptography - State of the Art and Evolution, LNCS
Citations:10 - 2 self

Documents Related by Co-Citation

53 Hash Functions Based on Block Ciphers – Xuejia Lai, James L. Massey - 1993
208 The design of Rijndael: AES - The advanced encryption standard – J Daemen, V Rijmen - 2002
27 How to Break MD5 – X Wang, H Yu
789 Communication theory of secrecy systems – C E Shannon - 1949
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
136 Cryptography and Computer Privacy – H Feistel - 1973
26 Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine – Jens-peter Kaps, Christof Paar
48 Comparison of the hardware performance of the AES candidates using reconfigurable hardware”, Proceeding of RSA Security conference – 2406 | P a g e – K Gaj, P Chodowiec
3 Security of Random Feistel Scemes with 5 or more rounds, Crypto ’04, Lecture Notes in Computer Science 3152, pp. 106–122, Springer. A Summary of the security results for Benes and Butterfly schemes We summarize the security results on Benes and Butterfly – J Patarin
2 3C-A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function. The preliminary draft version of this work is available at eprint-2005/390 – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson
2 Recent advances in hash functions-the way to go. Presented at – E Biham
2 Ongoing Research Areas in Symmetric Cryptography – Ecrypt Consortium - 2005
2 W.Wu :Block Cipher Analysis and Design – D Feng
2 Generic Attacks on Feistel Schemes, Available from the author – J Patarin
2 Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme,Designs – Luby-Rackoff G Piret
2 Ciphers: Security – Block G Piret - 2005
2 D.Feng and H.Yu – X Lai X Wang - 2005
21 On the Lai-Massey scheme – S Vaudenay