Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
13
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,639
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Software Encryption
Ciphers Secure against Related-Key Attacks
other
Author(s):
Stefan Lucks
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ChemSpider related publications
Most cited references
13
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
195
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Tweakable Block Ciphers
Moses Liskov
,
Ronald L. Rivest
,
David K. Wagner
(2002)
0
comments
Cited
44
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Improved Cryptanalysis of Rijndael
Niels Ferguson
,
John Kelsey
,
Stefan Lucks
…
(2001)
0
comments
Cited
42
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2004
Pages
: 359-370
DOI:
10.1007/978-3-540-25937-4_23
SO-VID:
95ed6a2e-44be-481f-93a4-1307c34d3b20
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Cryptographic Primitives Based on Multiword T-Functions
pp. 226
A New Stream Cipher HC-256
pp. 245
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
pp. 260
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices
pp. 49
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
pp. 65
Improving Fast Algebraic Attacks
pp. 279
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
pp. 299
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
pp. 332
Two Power Analysis Attacks against One-Mask Methods
pp. 348
Nonce-Based Symmetric Encryption
pp. 359
Ciphers Secure against Related-Key Attacks
pp. 389
The EAX Mode of Operation
pp. 408
CWC: A High-Performance Conventional Authenticated Encryption Mode
Similar content
3,639
Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos
Authors:
Junxin Chen
,
Lei Chen
,
Yicong Zhou
Ciphers in the sand: Interpretations of a woman taken in adultery (John 7.53-8.11)
Authors:
T. O'Loughlin
,
L.J. Kreitzer
,
T.W. Rooke
…
Optimal Differential Trails in SIMON-like Ciphers
Authors:
Zhengbin Liu
,
Yongqiang Li
,
Mingsheng Wang
See all similar
Cited by
10
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Authors:
Alex Biryukov
,
Dmitry Khovratovich
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
Authors:
Mihir Bellare
,
David Cash
Cryptography Secure against Related-Key Attacks and Tampering
Authors:
Mihir Bellare
,
David Cash
,
Rachel Miller
See all cited by