Browse > Article

스트림 암호의 발전 방향  

Yeom, Yong-Jin (국가보안기술연구소)
Hong, Jin (국가보안기술연구소)
Ji, Seong-Taek (국가보안기술연구소)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 I. Mironov, '(Not So) Random Shuffles of RC4', Advances in Cryptology - CRYPTO 2002
2 A. Biryukov, A. Shamir, D. Wagner, 'Realtime cryptanalysis of A5/1 on a PC,' Proceedings of Fast Software Encryption - FSE 2000
3 V. V. Chepyzhov, T. Johansson, and B. Smeets, 'A Simple algorithm for fast correlation attacks on stream ciphers,' Proceedings of Fast Software Encryption-FSE 2000
4 P. Hawkes, G. Rose, 'On the applicability of distinguishing attacks against stream ciphers,' Proceedings of the 3rd NESSIE Workshop, 2002
5 ECRYPT Project - European Network of Excellence in Cryptology. http://www.ecrypt.eu.org/
6 A. Shamir, 'Stream ciphers:Dead or Alive,' invited lecture at SASC 2004
7 S. Babbage, 'Stream ciphers: What does the industry want?,' Proceedings of SASC 2004
8 A. Biryukov, 'Block ciphers and stream ciphers: the state of the art,' IACR ePrint Archive 2004/094, 2004
9 강주성 외, '현대암호학', 경문사, 2000
10 AES, 'Advanced encryption algorithm (AES) development effort,' 1997-2000. http://csrc.nist.gov/encryption/aes/
11 SEED, 'SEED 블록 암호 알고리즘'. http://www.kisa.or.kr/seed/seed_kor.html
12 P. Chose, A. Joux, M. Mitton, 'Fast correlation attacks :An algorithmic point of view,' Advances in Cryptology-EUROCRYPT 2002
13 CRYPTREC Project - Cryptography Research & Evaluation Committehttp://www.ipa.go.jp/security/enc/CRYFIREC
14 N. T. Courtois, W. Meier, 'Algebraic attacks on stream ciphers with linear feedback,' Advances in Cryptology - EURO-CRYPT 2003
15 NESSIE Project - New European Schemes for Signature, Integrity, and Encryption. http://cryptonessie.org/
16 ARIA, '민관겸용 블록 암호 알고리즘 ARIA' http://www.nsri.re.kr/ARIA/
17 B. SIG, 'Bluetooth specification,' Technical Report, http://www.bluetooth.com
18 G. O. Partners, 'Specification of the 3GPP confidentiality and integrity algorithm: Kasumi algorithm specification - 3GPP TS 35.202,' Technical Report, http://www.Sgpp. org, 2000
19 A. Klimov, A. Shamir, 'A new class of invertible mappings,' Proceedings of CHES 2002
20 C. Canniere, J. Lano, P. Preneel, J. Vanderwalle, 'Distinguishing attacks on Sober-t32,' Proceedings of the 3rd NESSIE Workshop, 2002
21 L. of the IEEE CS, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specifications,' Technical Report, IEEE Standard 802.11, 1999
22 P. Souradyuti, B. Preneel, 'Analysis of Non-fortuitous RC4 key stream generator, Progress in Cryptology - INDOCRYPT 2003