| Specific Stream-Cipher Cryptanalysis |
|
|
Real Time Cryptanalysis of A5/1 on a PC |
|
|
1 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Statistical Analysis of the Alleged RC4 Keystream Generator |
|
|
19 | (12) |
|
|
|
|
|
|
|
|
|
|
| New Ciphers |
|
|
The Software-Oriented Stream Cipher SSC2 |
|
|
31 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Mercy: A Fast Large Block Cipher for Disk Sector Encryption |
|
|
49 | (15) |
|
|
|
|
|
| AES Cryptanalysis 1 |
|
|
A Statistical Attack on RC6 |
|
|
64 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent |
|
|
75 | (19) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Correlations in RC6 with a Reduced Number of Rounds |
|
|
94 | (15) |
|
|
|
|
|
|
|
|
|
|
| Block-Cipher Cryptanalysis 1 |
|
|
On the Interpolation Attacks on Block Ciphers |
|
|
109 | (12) |
|
|
|
|
|
|
|
|
|
|
|
Stochastic Cryptanalysis of Crypton |
|
|
121 | (13) |
|
|
|
|
|
|
|
|
|
|
| Power Analysis |
|
|
Bitslice Ciphers and Power Analysis Attacks |
|
|
134 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Securing the AES Finalists Against Power Analysis Attacks |
|
|
150 | (15) |
|
|
|
|
|
| General Stream-Cipher Cryptanalysis |
|
|
Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generators |
|
|
165 | (16) |
|
|
|
|
|
|
|
|
|
|
|
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers |
|
|
181 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack |
|
|
196 | (17) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| AES Cryptanalysis 2 |
|
|
Improved Cryptanalysis of Rijndael |
|
|
213 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
On the Pseudorandomness of the AES Finalists -- RC6 and Serpent |
|
|
231 | (13) |
|
|
|
|
|
|
|
|
|
|
| Block-Cipher Cryptanalysis 2 |
|
|
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family |
|
|
244 | (18) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Chosen-Plaintext Linear Attack on DES |
|
|
262 | (11) |
|
|
|
|
|
|
|
|
|
|
| Theoretical Work |
|
|
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure |
|
|
273 | (11) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation |
|
|
284 | (16) |
|
|
|
|
|
|
|
|
|
|
|
Efficient Methods for Generating MARS-Like S-Boxes |
|
|
300 | (15) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Author Index |
|
315 | |