Differential cryptanalysis

Results: 238



#Item
41Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1  State Key Laboratory of Information Security, Institute of Information Eng

Related-Key Differential Attack on Round Reduced RECTANGLE-80 Jinyong Shan1,2 , Lei Hu1,2 , Ling Song1,2 , Siwei Sun1,2 , and Xiaoshuang Ma1,2 1 State Key Laboratory of Information Security, Institute of Information Eng

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-10 22:05:20
42Microsoft Word - SEED_Self_Evaluation-English_M

Microsoft Word - SEED_Self_Evaluation-English_M

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
43SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

SEED Evaluation Report CRYPTREC Evaluation Committee Chair Hideki Imai Symmetric-Key Cryptography Subcommittee Chair Toshinobu Kaneko February 28, 2002

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
44Twofish Technical Report #7  Key Separation in Twofish John Kelsey∗ April 7, 2000

Twofish Technical Report #7 Key Separation in Twofish John Kelsey∗ April 7, 2000

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
45Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Security Weaknesses in Maurer-Like Randomized Stream Ciphers Niels Ferguson? , Bruce Schneier?? , and David Wagner? ? ? Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We defi

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
46Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Side Channel Cryptanalysis of Product Ciphers John Kelsey1 , Bruce Schneier1 , David Wagner2 , and Chris Hall3 1 Counterpane Internet Security 3031 Tisch Way, 100 Plaza East

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
47Twofish Technical Report #5  Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Twofish Technical Report #5 Impossible differentials in Twofish Niels Ferguson∗ October 19, 1999

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
48Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
49Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1  Reliable Software Technologies

Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
50Twofish Technical Report #1  Upper bounds on differential characteristics in Twofish Niels Ferguson Counterpane Systems

Twofish Technical Report #1 Upper bounds on differential characteristics in Twofish Niels Ferguson Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31