The phantom of differential characteristics
From MaRDI portal
Publication:2205883
DOI10.1007/s10623-020-00782-3zbMath1458.94263OpenAlexW3044528870MaRDI QIDQ2205883
Shaojing Fu, Vincent Rijmen, Chao Li, Bing Sun, Meichun Cao, Yunwen Liu, Guo-Qiang Liu, Wen-Ying Zhang
Publication date: 21 October 2020
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-020-00782-3
singular characteristicdifferential cryptanalysisAESPRINCEkey schedulesingular clustereffective keys
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The first collision for full SHA-1
- Truncated and multiple differential cryptanalysis of reduced round Midori128
- Midori: A Block Cipher for Low Energy
- Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis
- Cryptanalysis of KLEIN
- Multiple Differential Cryptanalysis of Round-Reduced PRINCE
- Rotational Cryptanalysis of ARX Revisited
- Multiple Differential Cryptanalysis: Theory and Practice
- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
- Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
- Observations on the SIMON Block Cipher Family
- Practical Free-Start Collision Attacks on 76-step SHA-1
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Markov Ciphers and Differential Cryptanalysis
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Higher Order Derivatives and Differential Cryptanalysis
- A Model for Structure Attacks, with Applications to PRESENT and Serpent
- PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
- Analysis of Differential Attacks in ARX Constructions
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- How to Break MD5 and Other Hash Functions
- Finding Collisions in the Full SHA-1
- The Delicate Issues of Addition with Respect to XOR Differences
This page was built for publication: The phantom of differential characteristics