On the Design of Permutation P in DES Type Cryptosystems (1990)

Cached

Download Links

by Lawrence Brown , Jennifer Seberry
Venue:Advances in Cryptology: Proceedings of EUROCRYPT ’89
Citations:6 - 2 self

Documents Related by Co-Citation

493 Differential Cryptanalysis of DES-like Cryptosystems – Eli Biham, Adi Shamir - 1991
56 LOKI: A Cryptographic Primitive for Authentication and Secrecy Applications – L Brown, J Pieprzyk, J Seberry - 1990
28 Differential Cryptanalysis of Snefru – E Biham, A Shamir - 1992
30 Differential Cryptanalysis of Feal and N-Hash – Eli Biham, Adi Shamir - 1991
87 Differential Cryptanalysis of the Full 16-round DES – Eli Biham, Adi Shamir - 1993
43 S.: Fast data encipherment algorithm FEAL – A Shimizu, Miyaguchi - 1987
108 On The Design Of S-Boxes – A. F. Webster, S. E. Tavares - 1986
8 Comparison of Block Ciphers – H Gustafson, E Dawson, B Caelli - 1990
28 The Structured Design of Cryptographically good s-boxes – Carlistle Aams, Stafford Tavares - 1990
14 On immunity against Biham and Shamir's "differential cryptanalysis". Information Processing Letters – C M Adams - 1992
22 An Expanded Set of S-box Design Criteria Based on Information Theory and its Relation to Differential-like Attacks – M Dawson, S Tavares - 1991
136 Cryptography and Computer Privacy – H Feistel - 1973
7 A Proposed Design for an Extended DES – L Brown - 1989
21 cryptography: A New Dimension in Data security,Iohn – c Meyer, S Matyas - 1982
10 Tuckerman: Analysis of a Weakened Feistel-like Cipher – E K Grossman, B - 1978
7 Iterative characteristics of DES and s 2 -DES – L R Knudsen - 1993
9 Methods and Instruments for Designing S-boxes – R Forr'e - 1990
17 A formal and practical design procedure for substitution-permutation network cryptosystems – C M Adams - 1990
8 The design of complete encryption networks using cryptographically equivalent permutations – F Ayoub - 1982