Revisiting key schedule's diffusion in relation with round function's diffusion
From MaRDI portal
(Redirected from Publication:2510656)
Recommendations
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 3937099 (Why is no real title available?)
- scientific article; zbMATH DE number 1189371 (Why is no real title available?)
- scientific article; zbMATH DE number 1107691 (Why is no real title available?)
- scientific article; zbMATH DE number 1950346 (Why is no real title available?)
- scientific article; zbMATH DE number 1455096 (Why is no real title available?)
- scientific article; zbMATH DE number 1498337 (Why is no real title available?)
- scientific article; zbMATH DE number 1759272 (Why is no real title available?)
- scientific article; zbMATH DE number 1440885 (Why is no real title available?)
- A Meet-in-the-Middle Attack on 8-Round AES
- A detailed analysis of SAFER K
- Biclique Cryptanalysis of the Full AES
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Improved Integral Attacks on MISTY1
- Improved single-key attacks on 8-round AES-192 and AES-256
- Information Security and Privacy
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Markov Ciphers and Differential Cryptanalysis
- Meet-in-the-middle attacks on reduced-round XTEA
- New attacks on IDEA with at least 6 rounds
- New block encryption algorithm MISTY
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- Serpent: a new block cipher proposal
- Structured Design of Substitution-Permutation Encryption Networks
- Three-subset meet-in-the-middle attack on reduced XTEA
- Zero correlation linear cryptanalysis with reduced data complexity
This page was built for publication: Revisiting key schedule's diffusion in relation with round function's diffusion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2510656)