Differential-linear attack

Results: 50



#Item
31Equations / Correlation attack / Cryptography / Differential equation / Nonlinear system / Linear equation / Linear system / Polynomial / QUAD / Elementary algebra / Mathematics / Stream ciphers

Algebraic Immunity of S-boxes and Augmented Functions Simon Fischer and Willi Meier FHNW, 5210 Windisch (Switzerland) Abstract. In this paper, the algebraic immunity of S-boxes and augmented functions of

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 12:41:00
32Key schedule / Differential cryptanalysis / Vincent Rijmen / Q / ARIA / Linear cryptanalysis / S-box / Serpent / XSL attack / Cryptography / Block ciphers / Advanced Encryption Standard

AES and the Wide Trail Design Strategy Joan Daemen1 and Vincent Rijmen2,3 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
33Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-06-03 08:04:08
34Linear cryptanalysis / Ciphertext / Differential cryptanalysis / Chosen-plaintext attack / VEST / Symmetric-key algorithm / SXAL/MBAL / Cipher / ICE / Cryptography / Stream ciphers / Block cipher

Chosen-Ciphertext Attacks against MOSQUITO Antoine Joux1,3 and Fr´ed´eric Muller2 1

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
35Block cipher / Piling-up lemma / Boomerang attack / Cryptanalysis / ICE / Mathematical sciences / Applied mathematics / CIPHERUNICORN-A / Differential-linear attack / Differential cryptanalysis / CIPHERUNICORN-E / Linear cryptanalysis

An Evaluation of the Security of CipherUnicorn-E Against Certain Attacks David Wagner

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
36Block cipher / Boomerang attack / Stream cipher / ICE / Advanced Encryption Standard / Cipher / Cryptanalysis / Symmetric-key algorithm / Chosen-plaintext attack / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Algebraic Techniques in Differential Cryptanalysis Martin Albrecht and Carlos Cid

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2009-03-31 06:03:14
37Block cipher / Advanced Encryption Standard / Cryptanalysis / Key schedule / CS-Cipher / Cipher / Slide attack / Data Encryption Standard / Index of cryptography articles / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The CS2 Block Cipher Tom St Denis Secure Science Corporation

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-28 14:40:08
38Keystream / Correlation attack / VEST / Weak key / Differential cryptanalysis / Linear feedback shift register / Blowfish / RC4 / Grain / Cryptography / Stream ciphers / HC-256

Stream Cipher HC-256 Hongjun Wu Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:42:09
39GOST / Slide attack / Chosen-plaintext attack / Ciphertext / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Linear cryptanalysis / Integral cryptanalysis / Cryptography / Espionage / GOST standards

Improved Slide Attacks Eli Biham

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
40Py / Bart Preneel / Block cipher / Differential cryptanalysis / Differential-linear attack / COSIC / Symmetric-key algorithm / Cipher / Keystream / Cryptography / Stream ciphers / Phelix

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE