Differential Attack on Message Authentication Codes (1994)

Cached

Download Links

by Kazuo Ohta , Mitsuru Matsui
Citations:5 - 0 self

Active Bibliography

802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
Publication Date: 01/01/96 Search this book: – Publisher John Wiley, Author(s) Bruce Schneier, Foreword Whitfield Diffie
249 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
166 Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish – B. Schneier - 1994
NESSIE D13 - Security Evaluation of NESSIE First Phase – Bart Preneel, Sean Murphy, Juliette White, Gwenaelle Martinet, B. Preneel, Bart Van Rompay, Louis Granboulan, G. Martinet, S. Murphy, Rachel Shipsey, Eli Biham, Orr Dunkelman, J. White, Markus Dichtl, Jean-Jacques Quisquater, Pascale Serf, Markus Schafheutle, HÃ¥vard Raddum, E. Biham, O. Dunkelman, Vladimir Furman, Mathieu Ciet, J-j. Quisquater, Francesco Sica, Lars Knudsen, H. Raddum
108 Tweakable block ciphers – Moses Liskov, Ronald L. Rivest, David Wagner - 2002
114 The Block Cipher SQUARE – Joan Daemen, Lars Knudsen, Vincent Rijmen - 1997
105 AES Proposal: Rijndael – Joan Daemen, Joan Daemen, Joan Daemen, Vincent Rijmen, Vincent Rijmen - 1998
90 Problem Areas for the IP Security Protocols – Steven M. Bellovin - 1996