📄 phelix.bbl
字号:
%AUTOMATICALLY GENERATED BIBLIOGRAPHY, DO NOT EDIT BY HAND
\begin{thebibliography}{RBBK01b}
\bibitem[Arm02]{Armknecht:Bluetooth02}
Frederik Armknecht.
\newblock A linearization attack on the {Bluetooth} key stream generator.
\newblock Cryptology ePrint Archive, Report 2002/191, 2002.
\newblock \url{http://eprint.iacr.org/2002/191}.
\bibitem[Cou02]{Courtois:Toyo02}
Nicolas Courtois.
\newblock Higher order correlation attacks, {XL} algorithm, and cryptanalysis
of {Toyocrypt}.
\newblock In {\em Information Security and Cryptology--Icisc 2002}, volume 2587
of {\em Lecture Notes in Computer Science}. Springer-Verlag, 2002.
\newblock To appear.
\bibitem[CP02]{CP:XSL02b}
Nicolas Courtois and Josef Pieprzyk.
\newblock Cryptanalysis of block ciphers with overdefined systems of equations.
\newblock In Yuliang Zheng, editor, {\em Advances in
Cryp\-tol\-ogy---ASIA\-CRYPT\nolinebreak[3]2002}, volume 2501 of {\em Lecture
Notes in Computer Science}, pages 267--287. Springer-Verlag, 2002.
\bibitem[DGV93]{JGV:stream93}
Joan Daemen, Ren{\'e} Govaerts, and Joos Vandewalle.
\newblock Resynchronisation weaknesses in synchronous stream ciphers.
\newblock In Tor Helleseth, editor, {\em Advances in
Cryp\-tol\-ogy---EURO\-CRYPT\nolinebreak[3] '93}, volume 765 of {\em Lecture
Notes in Computer Science}, pages 159--167. Springer-Verlag, 1993.
\bibitem[Gol00]{Golic:StreamModes01}
Jovan~Dj. Goli{\'c}.
\newblock Modes of operation of stream ciphers.
\newblock In Douglas~R. Stinson and Stafford Tavares, editors, {\em Selected
Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000}, volume
2012 of {\em Lecture Notes in Computer Science}, pages 233--247.
Springer-Verlag, 2000.
\bibitem[Helix03]{FWSKLK:Helix03}
Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, and Tadayoshi Kohno.
\newblock Helix: Fast encryption and authentication in a single cryptographic primitive.
\newblock In Thomas Johansson, editor, {\em Fast Software Encryption, 10th
International Workshop, {FSE}'03}, volume 2887 of {\em Lecture Notes in
Computer Science}, pages 330--346. Springer-Verlag, 2003.
\bibitem[Jut01]{Jutla:IACBC01}
Charanjit~S. Jutla.
\newblock Encryption modes with almost free message integrity.
\newblock In Birgit Pfitzmann, editor, {\em Advances in
Cryp\-tol\-ogy---EURO\-CRYPT\nolinebreak[3]2001}, volume 2045 of {\em Lecture
Notes in Computer Science}, pages 529--544, 2001.
\bibitem[KRRR98]{KRRR:RC2-98}
Lars~R. Knudsen, Vincent Rijmen, Ronald~L. Rivest, and M.J.B. Robshaw.
\newblock On the design and security of {RC2}.
\newblock In Serge Vaudenay, editor, {\em Fast Software Encryption, 5th
International Workshop, {FSE}'98}, volume 1372 of {\em Lecture Notes in
Computer Science}, pages 206--221. Springer-Verlag, 1998.
\bibitem[LM01]{LM:DiffAdd01}
Helger Lipmaa and Shiho Moriai.
\newblock Efficient algorithms for computing differential properties of
addition.
\newblock In Mitsuru Matsui, editor, {\em Fast Software Encryption2001},
Lecture Notes in Computer Science. Springer-Verlag, To appear, 2001.
\newblock Available from \url{http://www.tcs.hut.fi/~helger/papers/lm01/}.
\bibitem[Mul04]{Muller:Helix04}
Fr{\'e}d{\'e}ric Muller.
\newblock Differential Attacks against the Helix Stream Cipher.
\newblock In Bimal K. Roy and Willi Meier, editors, {\em Fast Software Encryption,
11th International Workshop, {FSE}'04}, volume 3017 of {\em Lecture Notes in
Computer Science}, pages 94--108. Springer-Verlag, 2004.
\bibitem[RBBK01a]{RBBK:OCB01sep}
Philip Rogaway, Mihir Bellare, John Black, and Ted Krovetz.
\newblock {OCB}: A block-cipher mode of operation for efficient authenticated
encryption, September 2001.
\newblock Available from \url{http://www.cs.ucdavis.edu/~rogaway}.
\bibitem[RBBK01b]{RBBK:OCB01}
Phillip Rogaway, Mihir Bellare, John Black, and Ted Krovetz.
\newblock {OCB}: A block-cipher mode of operation for efficient authenticated
encryption.
\newblock In {\em Eighth {ACM} Conference on Computer and Communications
Security ({CCS}-8)}, pages 196--205. ACM Press, 2001.
\bibitem[WHF]{WHF:CCM02}
Doug Whiting, Russ Housley, and Niels Ferguson.
\newblock Counter with {CBC-MAC} ({CCM}).
\newblock Available from \url{csrc.nist.gov/encryption/modes/
proposedmodes/ccm/ccm.pdf}.
\end{thebibliography}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -