Differential cryptanalysis

Results: 238



#Item
91Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
92Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
93Weak key / Linear cryptanalysis / Cipher / Correlation and dependence / Q / Differential cryptanalysis / Cryptography / Key schedule / Block cipher

On The Distribution of Linear Biases: Three Instructive Examples Mohamed Ahmed Abdelraheem1 , Martin ˚ Agren2 , Peter Beelen1 , and Gregor Leander1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-30 09:12:12
94Advanced Encryption Standard / SHARK / Integral cryptanalysis / ICE / Key schedule / Linear cryptanalysis / Differential cryptanalysis / International Data Encryption Algorithm / VEST / Cryptography / Block ciphers / KHAZAD

A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux Cedex, France [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
95VEST / Keccak / Differential cryptanalysis / Q / Advanced Encryption Standard / Cryptography / Stream ciphers / Linear cryptanalysis

Cryptanalysis of Ascon Christoph Dobraunig1 , Maria Eichlseder1 , Florian Mendel1 , and Martin Schl¨affer2 1 IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 17:37:58
96Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
97MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
98Linear feedback shift register / Cube attack / Differential cryptanalysis / Key schedule / Trivium / Cryptography / Stream ciphers / Grain

Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-26 18:35:08
99Linear algebra / Keccak / NIST hash function competition / Matrices / Linear map / Exponential function / Transformation matrix / Weight / Kernel / Mathematics / Algebra / Transformation

Characterization of Column Parity Kernel and Differential Cryptanalysis of Keccak Yin Tan, Kalikinkar Mandal and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {y24tan,kmanda

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:48:05
100Key schedule / ICE / Block cipher / FEAL / Cryptanalysis / VEST / Piling-up lemma / Differential-linear attack / Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Improved Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh1 , Hoda A. Alkhzaimi2 , Mohammad Reza Aref1 , Nasour Bagheri3 , Praveen Gauravaram4 , and Martin M. Lauridsen2 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-31 06:20:57
UPDATE