The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MISTY1 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2006 (15) 2007-2012 (17) 2013-2018 (16) 2021 (1)
Publication types (Num. hits)
article(22) incollection(2) inproceedings(25)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 25 occurrences of 19 keywords

Results
Found 49 publication records. Showing 49 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
196Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata Higher Order Differential Attacks on Reduced-Round MISTY1. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CRYPTREC, higher order differential attack, MISTY1, block cipher, NESSIE
156Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko Security Analysis of MISTY1. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MISTY1, Higher order differential, Chosen plaintext attack
116Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
107Orr Dunkelman, Nathan Keller An Improved Impossible Differential Attack on MISTY1. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
96Dai Yamamoto, Jun Yajima, Kouichi Itoh A Very Compact Hardware Implementation of the MISTY1 Block Cipher. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Compact Implementation, Block cipher, Hardware, ASIC
87Xiaorui Sun, Xuejia Lai Improved Integral Attacks on MISTY1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
87Steve Babbage, Laurent Frisch On MISTY1 Higher Order Differential Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
87Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko Strenght of MISTY1 without FL Function for Higher Order Differential Attack. Search on Bibsonomy AAECC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
80Mitsuru Matsui New Block Encryption Algorithm MISTY. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
67Paris Kitsos, Michalis D. Galanis, Odysseas G. Koufopavlou A RAM-based FPGA implementation of the 64-bit MISTY1 block cipher. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient FPGA Implementation of Block Cipher MISTY1. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
40Christos Strydis, Di Zhu, Georgi Gaydadjiev Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power
27Haopeng Fan, Wenhao Wang, Yongjuan Wang Cache attack on MISTY1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
27Jiqiang Lu, Wun-She Yap, Yongzhuang Wei Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Abdoul Rjoub, Ehab M. Ghabashneh Low Power High Speed MISTY1 Cryptography Approaches. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Yasir Khizar, Ning Wu, Xiaoqiang Zhang 0001 Compact Hardware Implementations of MISTY1 Block Cipher. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Yosuke Todo Integral Cryptanalysis on Full MISTY1. Search on Bibsonomy J. Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Yasir Khizar, Ning Wu, Xin Chen, Muhammad Rehan Yahya, Xiaoqiang Zhang 0001 FPGA based highly efficient MISTY1 architecture. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi A Practical-time Attack on Reduced-round MISTY1. Search on Bibsonomy ICISSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Achiya Bar-On, Nathan Keller A 2^70 Attack on the Full MISTY1. Search on Bibsonomy CRYPTO (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Orr Dunkelman, Nathan Keller Practical-time attacks against reduced variants of MISTY1. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Yosuke Todo Integral Cryptanalysis on Full MISTY1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
27Achiya Bar-On Improved Higher-Order Differential Attacks on MISTY1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
27Achiya Bar-On A 270 Attack on the Full MISTY1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
27Achiya Bar-On Improved Higher-Order Differential Attacks on MISTY1. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Yosuke Todo Integral Cryptanalysis on Full MISTY1. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Wentan Yi, Shaozhen Chen Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
27Orr Dunkelman, Nathan Keller Practical-Time Attacks Against Reduced Variants of MISTY1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
27Jiqiang Lu, Wun-She Yap, Yongzhuang Wei Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hirokatsu Nakagawa Finding Higher Order Differentials of MISTY1. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Jiqiang Lu, Wun-She Yap, Yongzhuang Wei Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
27Keting Jia, Leibo Li Improved Impossible Differential Attacks on Reduced-Round MISTY1. Search on Bibsonomy WISA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
27Christophe De Cannière Kasumi/Misty1. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yibin Dai, Shao-zhen Chen Weak-Key Class of MISTY1 for Related-Key Differential Attack. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Dai Yamamoto, Jun Yajima, Kouichi Itoh Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Yukiyasu Tsunoo, Teruo Saito, Hiroki Nakashima, Maki Shigeri Higher Order Differential Attack on 6-Round MISTY1. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Paris Kitsos, Michalis D. Galanis, Odysseas G. Koufopavlou Architectures and FPGA Implementations of the 64-Bit MISTY1 Block Cipher. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Christophe De Cannière Kasumi/Misty1. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2004 DBLP  BibTeX  RDF
27 Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
27Hidenori Ohta, Mitsuru Matsui A Description of the MISTY1 Encryption Algorithm. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
20Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki, Akashi Satoh High-performance ASIC implementations of the 128-bit block cipher CLEFIA. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko An Optimized Algebraic Method for Higher Order Differential Attack. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Alex Biryukov, Christophe De Cannière Block Ciphers and Systems of Quadratic Equations. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations
20Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
20Ulrich Kühn 0001 Cryptanalysis of Reduced-Round MISTY. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #49 of 49 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license