@inproceedings{d4d751e117c44765bfc0df3be37550e5,
title = "Known-IV attacks on triple modes of operation of block ciphers",
abstract = "With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE{\textquoteright}98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation which are combined with cascade operations. 123 triple modes are analyzed with complexities less than E. Biham{\textquoteright}s results. Our work shows that the securities of many triple modes decrease when the initial values are exposed.",
keywords = "Block cipher, Mode of operation for DES, Triple DES",
author = "Deukjo Hong and Jaechul Sung and Seokhie Hong and Wonil Lee and Sangjin Lee and Jongin Lim and Okyeon Yi",
note = "Publisher Copyright: {\textcopyright} Springer-Verlag Berlin Heidelberg 2001.; 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001 ; Conference date: 09-12-2001 Through 13-12-2001",
year = "2001",
doi = "10.1007/3-540-45682-1_13",
language = "English",
isbn = "3540429875",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "208--221",
editor = "Colin Boyd",
booktitle = "Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
address = "Germany",
}