Revisiting key schedule's diffusion in relation with round function's diffusion
From MaRDI portal
Publication:2510656
DOI10.1007/s10623-013-9804-9zbMath1344.94056OpenAlexW1967927775MaRDI QIDQ2510656
Publication date: 1 August 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-013-9804-9
Related Items
Uses Software
Cites Work
- A detailed analysis of SAFER K
- New attacks on IDEA with at least 6 rounds
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Three-Subset Meet-in-the-Middle Attack on Reduced XTEA
- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Meet-in-the-Middle Attacks on Reduced-Round XTEA
- Biclique Cryptanalysis of the Full AES
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A Meet-in-the-Middle Attack on 8-Round AES
- Improved Integral Attacks on MISTY1
- Structured Design of Substitution-Permutation Encryption Networks
- Markov Ciphers and Differential Cryptanalysis
- New block encryption algorithm MISTY
- Serpent: A New Block Cipher Proposal
- Zero Correlation Linear Cryptanalysis with Reduced Data Complexity
- Information Security and Privacy
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item