Differential Cryptanalysis of Keccak Variants
From MaRDI portal
Publication:2870091
DOI10.1007/978-3-642-45239-0_9zbMATH Open1317.94118OpenAlexW181099296MaRDI QIDQ2870091FDOQ2870091
Authors: Stefan Kölbl, Florian Mendel, Tomislav Nad, Martin Schläffer
Publication date: 17 January 2014
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-45239-0_9
Recommendations
- Differential cryptanalysis of KHF
- Differential cryptanalysis in the fixed-key model
- Conditional differential cryptanalysis for Kreyvium
- Differential Cryptanalysis for Multivariate Schemes
- Differential cryptanalysis of DES-like cryptosystems
- scientific article; zbMATH DE number 417582
- Key-dependent S-boxes and differential cryptanalysis
- Differential cryptanalysis of SipHash
- Differential-linear cryptanalysis revisited
- Differential-Linear Cryptanalysis Revisited
Cited In (21)
- Differential Cryptanalysis of the ICE Encryption Algorithm
- Title not available (Why is that?)
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Impact of the Hamming weight of the difference of two random variables on the probability of its preservation after addition and subtraction
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- Differential biases in reduced-round Keccak
- Title not available (Why is that?)
- Differential Propagation Analysis of Keccak
- Unaligned rebound attack: application to Keccak
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Key-dependent S-boxes and differential cryptanalysis
- Title not available (Why is that?)
- Keccak
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- TIDAL: practical collisions on state-reduced \textsc{Keccak} variants
- Practical collision attacks against round-reduced SHA-3
- An Improved Truncated Differential Cryptanalysis of Klein
- Differential power analysis of MAC-Keccak at any key-length
This page was built for publication: Differential Cryptanalysis of Keccak Variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2870091)