Differential cryptanalysis

Results: 238



#Item
11Block ciphers / Data Encryption Standard / Linear cryptanalysis / Advanced Encryption Standard / Q / S-box / ICE / Differential cryptanalysis / VEST / PRESENT / Stream cipher / Key schedule

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
12Applied mathematics / Cryptography / Block ciphers / Data Encryption Standard / Cryptanalysis / Linear cryptanalysis / Differential cryptanalysis / S-box / Advanced Encryption Standard / PRESENT / LOKI

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
13Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
14NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
15Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:42
16Cryptography / Py / Differential cryptanalysis / Advanced Encryption Standard / Block cipher / Bart Preneel / Side-channel attack / Cryptanalysis / ICE

ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:17:24
17

Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-24 15:27:13
    18

    Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

    Add to Reading List

    Source URL: www1.spms.ntu.edu.sg

    Language: English - Date: 2015-10-05 00:19:26
      19Differential cryptanalysis / Linear cryptanalysis / Block cipher / Stream cipher / Data Encryption Standard / S-box / Key schedule / Advanced Encryption Standard / NOEKEON / Higher-order differential cryptanalysis

      The Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2 1 ProtonWorld, Zweefvliegtuigstraat 10, B-1130 Brussel, Belgium

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:38
      20

      Differential-Linear Cryptanalysis Revisited C´eline Blondeau1 and Gregor Leander2 and Kaisa Nyberg1 1 2

      Add to Reading List

      Source URL: users.ics.aalto.fi

      Language: English - Date: 2014-03-13 03:39:21
        UPDATE