Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES

From MaRDI portal
Revision as of 21:13, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3452355

DOI10.1007/3-540-68697-5_19zbMath1329.94066OpenAlexW1546907539WikidataQ56335890 ScholiaQ56335890MaRDI QIDQ3452355

John Kelsey, Bruce Schneier, David Wagner

Publication date: 11 November 2015

Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68697-5_19



Related Items

SEA: A Scalable Encryption Algorithm for Small Embedded Applications, Zero-correlation attacks: statistical models independent of the number of approximations, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers, Practical-time related-key attack on GOST with secret S-boxes, A single-key attack on the full GOST block cipher, A bit-vector differential model for the modular addition by a constant, A Unified Approach to Related-Key Attacks, A (Second) Preimage Attack on the GOST Hash Function, On the Salsa20 Core Function, Transposition of AES Key Schedule, A note on quantum related-key attacks, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony, A methodology for differential-linear cryptanalysis and its applications, The (related-key) impossible boomerang attack and its application to the AES block cipher, Cryptanalysis of the GOST Hash Function, Unnamed Item, Revisiting key schedule's diffusion in relation with round function's diffusion, The Delicate Issues of Addition with Respect to XOR Differences, Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами, The Tiny Encryption Algorithm, Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, Meet-in-the-Middle Attacks on Reduced-Round XTEA, Unnamed Item, Reflection Cryptanalysis of Some Ciphers, New attacks on IDEA with at least 6 rounds


Uses Software


Cites Work