Revisiting key schedule's diffusion in relation with round function's diffusion
From MaRDI portal
Publication:2510656
DOI10.1007/S10623-013-9804-9zbMATH Open1344.94056OpenAlexW1967927775MaRDI QIDQ2510656FDOQ2510656
Authors: Xuejia Lai, Jialing Huang
Publication date: 1 August 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-013-9804-9
Recommendations
Cites Work
- New block encryption algorithm MISTY
- Title not available (Why is that?)
- Title not available (Why is that?)
- Biclique Cryptanalysis of the Full AES
- Serpent: a new block cipher proposal
- Markov Ciphers and Differential Cryptanalysis
- Zero correlation linear cryptanalysis with reduced data complexity
- Title not available (Why is that?)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
- Improved single-key attacks on 8-round AES-192 and AES-256
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Title not available (Why is that?)
- Meet-in-the-middle attacks on reduced-round XTEA
- A Meet-in-the-Middle Attack on 8-Round AES
- Title not available (Why is that?)
- Improved Integral Attacks on MISTY1
- Structured Design of Substitution-Permutation Encryption Networks
- Title not available (Why is that?)
- A detailed analysis of SAFER K
- Three-subset meet-in-the-middle attack on reduced XTEA
- Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
- Title not available (Why is that?)
- Information Security and Privacy
- New attacks on IDEA with at least 6 rounds
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (2)
Uses Software
This page was built for publication: Revisiting key schedule's diffusion in relation with round function's diffusion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2510656)