Sciweavers

7 search results - page 1 / 2
» fse 1994
Sort
View
FSE
1994
Springer
110views Cryptology» more  FSE 1994»
13 years 7 months ago
Searching for the Optimum Correlation Attack
Ross J. Anderson
FSE
1994
Springer
142views Cryptology» more  FSE 1994»
13 years 7 months ago
Linear Cryptanalysis of Stream Ciphers
Jovan Dj. Golic
FSE
1994
Springer
145views Cryptology» more  FSE 1994»
13 years 7 months ago
TEA, a Tiny Encryption Algorithm
We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
David J. Wheeler, Roger M. Needham
FSE
1994
Springer
127views Cryptology» more  FSE 1994»
13 years 7 months ago
The RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of da...
Ronald L. Rivest
FSE
1994
Springer
125views Cryptology» more  FSE 1994»
13 years 7 months ago
Linear Cryptanalysis Using Multiple Approximations and FEAL
We describe the results of experiments on the use of multiple approximations in a linear cryptanalytic attack on FEAL; we pay particular attention to FEAL-8. While these attacks on...
Burton S. Kaliski Jr., Matthew J. B. Robshaw