Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
From MaRDI portal
Publication:3452355
DOI10.1007/3-540-68697-5_19zbMath1329.94066OpenAlexW1546907539WikidataQ56335890 ScholiaQ56335890MaRDI QIDQ3452355
John Kelsey, Bruce Schneier, David Wagner
Publication date: 11 November 2015
Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68697-5_19
Related Items
SEA: A Scalable Encryption Algorithm for Small Embedded Applications, Zero-correlation attacks: statistical models independent of the number of approximations, A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis, On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers, Practical-time related-key attack on GOST with secret S-boxes, A single-key attack on the full GOST block cipher, A bit-vector differential model for the modular addition by a constant, A Unified Approach to Related-Key Attacks, A (Second) Preimage Attack on the GOST Hash Function, On the Salsa20 Core Function, Transposition of AES Key Schedule, A note on quantum related-key attacks, Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006, A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony, A methodology for differential-linear cryptanalysis and its applications, The (related-key) impossible boomerang attack and its application to the AES block cipher, Cryptanalysis of the GOST Hash Function, Unnamed Item, Revisiting key schedule's diffusion in relation with round function's diffusion, The Delicate Issues of Addition with Respect to XOR Differences, Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами, The Tiny Encryption Algorithm, Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, Meet-in-the-Middle Attacks on Reduced-Round XTEA, Unnamed Item, Reflection Cryptanalysis of Some Ciphers, New attacks on IDEA with at least 6 rounds
Uses Software
Cites Work
- Parallel collision search with cryptanalytic applications
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Markov Ciphers and Differential Cryptanalysis
- Fast Software Encryption Functions
- SAFER K-64: A byte-oriented block-ciphering algorithm
- A software-optimized encryption algorithm
- On the weak keys of blowfish
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item