On Applying Linear Cryptanalysis to IDEA (English)
- New search for: Hawkes, P.
- New search for: O'Connor, L.
- New search for: Hawkes, P.
- New search for: O'Connor, L.
- New search for: Kim, K.
- New search for: Matsumoto, T.
In:
Theory and applications of cryptology and information security: Advances in cryptology; ASIACRYPT '96
1163
;
105-115
;
1996
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:On Applying Linear Cryptanalysis to IDEA
-
Contributors:
-
Conference:International conference, Theory and applications of cryptology and information security: Advances in cryptology; ASIACRYPT '96 ; 1996 ; Kyongju; Korea
-
Published in:Theory and applications of cryptology and information security: Advances in cryptology; ASIACRYPT '96 , 1163 ; 105-115LECTURE NOTES IN COMPUTER SCIENCE , 1163 ; 105-115
-
Publisher:
- New search for: Springer
-
Publication date:1996-01-01
-
Size:11 pages
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic CurvesMiyaji, A. et al. | 1996
- 15
-
Cryptographic Protocols Based on Real-Quadratic A-FieldsBiehl, I. / Meyer, B. / Thiel, C. et al. | 1996
- 26
-
Minding your p's and q'sAnderson, R. / Vaudeney, S. et al. | 1996
- 36
-
Authenticated Multi-Party Key AgreementJust, M. / Vaudenay, S. et al. | 1996
- 50
-
Cryptography and the Internet : Lessons and ChallengesMcCurley, K. S. et al. | 1996
- 57
-
Generating Standard DSA Signatures Without Long InversionLenstra, A. K. et al. | 1996
- 65
-
A Fast Software Implementation for Arithmetic Operations in GF(2^n)De Win, E. / Bosselaers, A. / Vandenberghe, S. / De Gersem, P. et al. | 1996
- 77
-
Hash Functions Based on Block Ciphers and Quaternary CodesKnudsen, L. / Preneel, B. et al. | 1996
- 91
-
Generalized Feistel NetworksNyberg, K. et al. | 1996
- 105
-
On Applying Linear Cryptanalysis to IDEAHawkes, P. / O'Connor, L. et al. | 1996
- 116
-
A Multi-Recastable Ticket Scheme for Electronic ElectionsFan, C.-I. / Lei, C.-L. et al. | 1996
- 125
-
Some Remarks on a Receipt-Free and Universally Verifiable Mix-Type Voting SchemeMichels, M. / Horster, P. et al. | 1996
- 133
-
Observations on Non-repudiationZhou, J. / Gollman, D. et al. | 1996
- 145
-
On the Efficiency of One-Time Digital SignaturesBleichenbacher, D. / Maurer, U. et al. | 1996
- 159
-
A Hidden Cryptographic Assumption in No-Transferable Identification SchemesSakurai, K. et al. | 1996
- 173
-
Electronic Money and Key Management from Global and Regional Points of ViewTsujii, S. et al. | 1996
- 185
-
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human IdentificationKobara, K. / Imai, H. et al. | 1996
- 196
-
Towards Characterizing When Information-Theoretic Secret Key Agreement Is PossibleMaurer, U. / Wolf, S. et al. | 1996
- 210
-
Key Sharing Based on the Wire-Tap Channel Type II Concept with Noisy Main ChannelKorjik, V. / Kushnir, D. et al. | 1996
- 218
-
Generalization of Higher Order SAC to Vector Output Boolean FunctionsKurosawa, K. / Satoh, T. et al. | 1996
- 232
-
On the Correlation Immune Functions and Their NonlinearityChee, S. / Lee, S. / Lee, D. et al. | 1996
- 244
-
How to Date Blind SignaturesAbe, M. / Fujisaki, E. et al. | 1996
- 252
-
Provably Secure Blind Signature SchemesPointcheval, D. / Stern, J. et al. | 1996
- 266
-
Cost-Effective Payment Schemes with Privacy RegulationM'Raihi, D. et al. | 1996
- 276
-
Mis-representation of Identities in E-Cash Schemes and How to Prevent itChan, A. / Frankel, Y. / MacKenzie, P. / Tsiounis, Y. et al. | 1996
- 286
-
"Indirect Discourse Proofs": Achieving Efficient Fair Off-Line E-cashFrankel, Y. / Tsiounis, Y. / Yung, M. et al. | 1996
- 301
-
The Validation of Cryptographic AlgorithmsStern, J. et al. | 1996
- 311
-
Convertible Group SignaturesSeung Joo Kim / Sung Jun Park / Dong Ho Won et al. | 1996
- 322
-
How to Utilize the Transformability of Digital Signatures for Solving the Oracle ProblemMambo, M. / Sakurai, K. / Okamoto, E. et al. | 1996
- 334
-
On the Risk of Disruption in Several Multiparty Signature SchemesMichels, M. / Horster, P. et al. | 1996
- 346
-
Correlation Attacks on Cascades of Clock Controlled Shift RegistersGieselmann, W. / Gollmann, D. et al. | 1996
- 360
-
Conditional Correlation Attack on Nonlinear Filter GeneratorsLee, S. / Chee, S. / Park, S. et al. | 1996
- 368
-
The Cryptographic Security of the Syndrome Decoding Problem for Rank Distance CodesChabaud, F. / Stern, J. et al. | 1996
- 382
-
A World Wide Number Field Sieve Factoring Record: on to 512 BitsCowie, J. / Dodson, B. / Marije Elkenbracht-Huizing, R. / Lenstra, A. K. et al. | 1996