Differential cryptanalysis

Results: 238



#Item
61Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
62Equivalence relation / Differential cryptanalysis / Differential equation / ICE / Function / Vector space / Equivalence of categories / Algebra / Mathematics / Linear cryptanalysis

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
63Advanced Encryption Standard / K1 / Differential cryptanalysis / Slide attack / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis Farzaneh Abed, Eik List, Stefan Lucks Bauhaus-University Weimar, Germany {farzaneh.abed,eik.list,stefan.lucks}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 07:31:29
64SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12
65Boomerang attack / SHA-1 / Blake / Differential cryptanalysis / SHA-2 / Boomerang / MD5 / Differential equation / Error detection and correction / Cryptography / Cryptographic hash functions

The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 20:17:27
66Ciphertext / Chosen-plaintext attack / ICE / Cryptanalysis / Stream cipher / Grain / Linear cryptanalysis / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Block cipher

Optimized Interpolation Attacks on LowMC Itai Dinur1 , Yunwen Liu2 , Willi Meier3 , and Qingju Wang2,4 ´ D´epartement d’Informatique, Ecole Normale Sup´erieure, Paris, France Dept. Electrical Engineering (ESAT), KU

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 10:17:39
67Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
68SHA-1 / Collision attack / MD5 / Keccak / Hash function / Preimage attack / SHA-2 / Differential cryptanalysis / Error detection and correction / Cryptographic hash functions / Cryptography

Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 11:45:40
69Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-16 10:47:29
70SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
UPDATE