Differential cryptanalysis

Results: 238



#Item
161Integral cryptanalysis / Linear cryptanalysis / Differential cryptanalysis / MMB / Cryptanalysis

Cryptanalysis of the full MMB block cipher

Add to Reading List

Source URL: sac.ucalgary.ca

Language: English - Date: 2009-09-08 16:49:36
162KASUMI / Feistel cipher / Block cipher / Differential cryptanalysis / Advanced Encryption Standard / ICE / Key schedule / Linear cryptanalysis / DEAL / Cryptography / MISTY1 / Data Encryption Standard

Supporting Document of MISTY1 Version[removed]Supporting Document of MISTY1

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2006-09-01 06:41:16
163LEX / Block cipher / Differential cryptanalysis / Trivium / Cryptography / Stream ciphers / Advanced Encryption Standard

A New Attack on the LEX Stream Cipher Orr Dunkelman1,⋆ and Nathan Keller2,⋆⋆ ´

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2009-11-22 09:08:02
164Key schedule / ICE / Decorrelation theory / Block cipher / Advanced Encryption Standard / Boomerang attack / Cryptography / Differential cryptanalysis / DFC

1 On The Decorrelated Fast Cipher (DFC) and Its

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
165Differential cryptanalysis / Key schedule / Stream ciphers / Serpent / Q / Advanced Encryption Standard / ICE / Cipher / SC2000 / Cryptography / Block ciphers / Linear cryptanalysis

PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov1, L.R. Knudsen2 , G. Leander1 , C. Paar1, A. Poschmann1, M.J.B. Robshaw3 , Y. Seurin3 , and C. Vikkelsoe2

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-11-09 16:59:40
166Key management / Differential cryptanalysis / Blowfish / Secure cryptoprocessor / Key schedule / Cipher / RC5 / Skipjack / Triple DES / Cryptography / Data Encryption Standard / Block ciphers

M Lomas et al. (ed.), Security Protocols, 5th International Workshop, Paris, France, April 7–9, 1997, Proceedings, Springer LNCS 1361, pp 125–136, ISBN[removed].

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-02-09 17:09:39
167Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
168Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
169Key schedule / Data Encryption Standard / Blowfish / Linear cryptanalysis / Differential cryptanalysis / S-box / Substitution-permutation network / LOKI / FEAL / Cryptography / Block ciphers / ICE

Designs, Codes and Cryptography, 12, 283–[removed]c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.

Add to Reading List

Source URL: web.eecs.utk.edu

Language: English - Date: 2004-12-30 09:37:46
170Ciphertext / Symmetric-key algorithm / Differential cryptanalysis / Cryptanalysis / Key schedule / KHAZAD / Cipher / Boomerang attack / SAFER / Cryptography / Block ciphers / Stream cipher

NADA Numerisk analys och datalogi Kungl Tekniska Högskolan

Add to Reading List

Source URL: www.nada.kth.se

Language: English
UPDATE