UP - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UPUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 60
1.
Celotno besedilo
2.
Celotno besedilo

PDF
3.
Celotno besedilo

PDF
4.
  • Weak keys of the full MISTY... Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
    Lu, Jiqiang; Yap, Wun-She; Wei, Yongzhuang IET information security, 09/2018, Letnik: 12, Številka: 5
    Journal Article
    Recenzirano

    The MISTY1 block cipher has a 64-bit block size, a 128-bit master key, and a total of 8 rounds. It is an ISO international standard, a Japanese CRYPTREC-recommended e-government cipher, and a ...
Celotno besedilo
5.
  • Improved zero-correlation l... Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys
    Liu, Zhiqiang; Sun, Bing; Wang, Qingju ... IET information security, 03/2016, Letnik: 10, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Camellia is one of the widely used block ciphers, which has been included in the NESSIE block cipher portfolio and selected as a standard by ISO/IEC. In this study, the authors observe that there ...
Celotno besedilo

PDF
6.
  • Finding Higher Order Differ... Finding Higher Order Differentials of MISTY1
    TSUNOO, Yukiyasu; SAITO, Teruo; KAWABATA, Takeshi ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012, Letnik: E95.A, Številka: 6
    Journal Article
    Recenzirano

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it is ...
Celotno besedilo
7.
  • Finding Higher Order Differ... Finding Higher Order Differentials of MISTY1
    TSUNOO, Yukiyasu; SAITO, Teruo; KAWABATA, Takeshi ... IEICE transactions on fundamentals of electronics, communications and computer sciences, 01/2012, Letnik: E95.A, Številka: 6
    Journal Article
    Recenzirano

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it is ...
Celotno besedilo
8.
  • Shorter bit sequence is eno... Shorter bit sequence is enough to break stream cipher LILI-128
    Tsunoo, Y.; Saito, T.; Shigeri, M. ... IEEE transactions on information theory, 12/2005, Letnik: 51, Številka: 12
    Journal Article
    Recenzirano

    LILI-128 is the stream cipher proposed as a candidate cipher for the New European Schemes for Signatures, Integrity, and Encryption (NESSIE) Project. Some methods of breaking it more efficiently than ...
Celotno besedilo
9.
  • Security Analysis of 7-Roun... Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
    TSUNOO, Yukiyasu; SAITO, Teruo; SHIGERI, Maki ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2010/01/01, 2010-00-00, 20100101, Letnik: E93.A, Številka: 1
    Journal Article
    Recenzirano

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been ...
Celotno besedilo
10.
  • Higher Order Differential A... Higher Order Differential Attack on 6-Round MISTY1
    TSUNOO, Yukiyasu; SAITO, Teruo; NAKASHIMA, Hiroki ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009/01/01, 2009-00-00, 20090101, Letnik: E92.A, Številka: 1
    Journal Article
    Recenzirano

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been ...
Celotno besedilo
1 2 3 4 5
zadetkov: 60

Nalaganje filtrov