ECRYPT yearly report on algorithms and keysizes

作者: Serge Vaudenay , Thomas Pornin , Christian Rechberger , Christof Paar , Benne de Weger

DOI:

关键词:

摘要:

参考文章(64)
Antoine Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions Advances in Cryptology – CRYPTO 2004. pp. 306- 316 ,(2004) , 10.1007/978-3-540-28628-8_19
C. Gehrmann, K. Nyberg, Security in personal area networks IET Digital Library. pp. 191- 230 ,(2004) , 10.1049/PBTE051E_CH9
Mike Loukides, John Gilmore, Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design O'Reilly & Associates, Inc.. ,(1998)
Matt Blaze, Whitfield Diffie, Ronald L Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, Michael Wiener, Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists Defense Technical Information Center. ,(1996) , 10.21236/ADA385264
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer, Analysis of Bernstein's Factorization Circuit international conference on the theory and application of cryptology and information security. pp. 1- 26 ,(2002) , 10.1007/3-540-36178-2_1
Phong Q. Nguyen, Igor E. Shparlinski, The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces Designs, Codes and Cryptography. ,vol. 30, pp. 201- 217 ,(2003) , 10.1023/A:1025436905711
Máire McLoone, John V McCanny, None, High Performance Single-Chip FPGA Rijndael Algorithm Implementations cryptographic hardware and embedded systems. pp. 65- 76 ,(2001) , 10.1007/3-540-44709-1_7
Serge Vaudenay, Hidden Collisions on DSS international cryptology conference. ,vol. 1109, pp. 83- 88 ,(1996) , 10.1007/3-540-68697-5_7
M. Bellare, Optimal Asymmetric Encryption-How to Encrypt with RSA theory and application of cryptographic techniques. ,(1995)