Differential cryptanalysis

Results: 238



#Item
71Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 08:22:01
72Feistel cipher / Block cipher / Differential cryptanalysis / SMS4 / Impossible differential cryptanalysis

A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-09-06 23:14:46
73Key schedule / RC5 / Block cipher / Stream cipher / Tiny Encryption Algorithm / Salsa20 / FEAL / Feistel cipher / Cryptography / Differential cryptanalysis / XTEA

Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-17 08:30:51
74Advanced Encryption Standard / Cryptanalysis / Chosen-plaintext attack / Key schedule / Ciphertext / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / ICE

Improved Impossible Differential Cryptanalysis of CLEFIA Wei Wang1 and Xiaoyun Wang2? 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-03-05 22:03:30
75Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE

Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:13
76Linear cryptanalysis / Differential cryptanalysis / ICE / Authenticated encryption / Stream ciphers / Cryptography / Advanced Encryption Standard / Block cipher

Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Beg¨ ul Bilgin1,2 , Andrey Bogdanov3 , Miroslav Kneˇzevi´c4 , Florian Mendel5 , and Qingju Wang1,6 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:35:21
77Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-22 00:23:21
78Modular arithmetic / M6 / RC5 / ICE / Differential cryptanalysis / Akelarre / RC6 / Linear cryptanalysis / Madryga / Cryptography / Block ciphers / Mod n cryptanalysis

Mod n Cryptanalysis, with Applications Against RC5P and M6 John Kelsey? , Bruce Schneier?? , and David Wagner? ? ? Abstract. We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
79Differential cryptanalysis / ICE / DES-X / Blowfish / Chosen-plaintext attack / Advantage / Block cipher / Ciphertext / Key schedule / Cryptography / Data Encryption Standard / NewDES

Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
80Block cipher / Key schedule / Cryptanalysis / Cryptography / Differential cryptanalysis / Linear cryptanalysis

Impossible Differential Cryptanalysis of Reduced Round SIMON Zhan Chen1 , Ning Wang2,3 , and Xiaoyun Wang2,3,4 * 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 05:44:49
UPDATE