Rebound attack

Results: 7



#Item
1Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
2Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
3

Unaligned Rebound Attack: Application to Keccak Alexandre Duc1,∗ , Jian Guo2,† , Thomas Peyrin3,‡ , and Lei Wei3,§ 1 Ecole Polytechnique F´ed´erale de Lausanne, Switzerland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-19 04:50:18
    4

    Improved Rebound Attack on the Finalist Grøstl Jérémy Jean1 María Naya-Plasencia2 1 École

    Add to Reading List

    Source URL: fse2012.inria.fr

    Language: English - Date: 2012-03-28 03:18:43
      5Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

      Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:32
      6GOST standards / GOST / Hashing / SHA-1 / MD5 / Keccak / Hash function / Advanced Encryption Standard / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

      rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2013-09-10 21:29:48
      UPDATE