Differential-linear attack

Results: 50



#Item
21MISTY1 / Cryptanalysis / Block cipher / Linear cryptanalysis / Interpolation attack / Ciphertext / Chosen-plaintext attack / ICE / Data Encryption Standard / Cryptography / Differential cryptanalysis / KASUMI

3-5 A Study on Higher Order Differential Cryptanalysis of 64 Bit Block Cipher KASUMI TANAKA Hidema, SUGIO Nobuyuki, and KANEKO Toshinobu In this paper, we show the strength of 128 bit secret key -64 bit block cipher KASU

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:39:19
22Linear cryptanalysis / Cryptanalysis / ICE / Higher-order differential cryptanalysis / Advanced Encryption Standard / MISTY1 / Chosen-plaintext attack / FEAL / Boomerang attack / Cryptography / Differential cryptanalysis / Block cipher

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis is consi

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:38:35
23KASUMI / Cryptanalysis / Block cipher / Ciphertext / Feistel cipher / ICE / Chosen-plaintext attack / Symmetric-key algorithm / Linear cryptanalysis / Cryptography / Differential cryptanalysis / MISTY1

3-4 An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers TANAKA Hidema and KANEKO Toshinobu We show an expansion algorithm for a higher order differential cryptanalysis which is one of

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2005-09-28 07:34:21
24Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
25Advanced Encryption Standard / SHARK / Integral cryptanalysis / ICE / Key schedule / Linear cryptanalysis / Differential cryptanalysis / International Data Encryption Algorithm / VEST / Cryptography / Block ciphers / KHAZAD

A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux Cedex, France [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
26Linear feedback shift register / Cube attack / Differential cryptanalysis / Key schedule / Trivium / Cryptography / Stream ciphers / Grain

Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-26 18:35:08
27Key schedule / ICE / Block cipher / FEAL / Cryptanalysis / VEST / Piling-up lemma / Differential-linear attack / Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Improved Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh1 , Hoda A. Alkhzaimi2 , Mohammad Reza Aref1 , Nasour Bagheri3 , Praveen Gauravaram4 , and Martin M. Lauridsen2 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-31 06:20:57
28Stream ciphers / Differential cryptanalysis / Boomerang attack / Block cipher / E0 / XTEA / Linear feedback shift register / Constraint programming / Salsa20 / Cryptography / Pseudorandom number generators / SHACAL

Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-18 13:28:11
29Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
30ICE / Ciphertext / Linear feedback shift register / Chosen-plaintext attack / Block cipher / Data Encryption Standard / Cryptography / Differential cryptanalysis / Stream cipher

Cryptanalysis of Hummingbird-1 Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
UPDATE