Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This letter examines outline measures of strength against the differential and linear cryptanalysis. These measures are useful to estimate the number of rounds giving an immune iterated cipher. This letter reports that the outline measures of strength are useful to relatively estimate the strength of generalized feistel ciphers.
- 社団法人電子情報通信学会の論文
- 1999-01-25
著者
-
MATSUMOTO Tsutomu
Yokohama National University
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
Kaneko Yasuyoshi
Yokohama Research center Telecommunications Advancement Organization of Japan
-
KANEKO Yasuyoshi
Yokohama Research Center, Telecommunications Advancement Organization of Japan
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- On the security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis(Special Section on Cryptography and Information Security)
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- FOREWORD (Special Section on Cryptography and Information Security)
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- The Algeblaic Degree and Security of Generalized PURE Ciphers
- Information-Flow-Based Access Control for Web Browsers
- Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- FOREWORD
- Catching the Behavioral Differences between Multiple Executions for Malware Detection