Differential Cryptanalysis of Keccak Variants
From MaRDI portal
Publication:2870091
Recommendations
- Differential cryptanalysis of KHF
- Differential cryptanalysis in the fixed-key model
- Conditional differential cryptanalysis for Kreyvium
- Differential Cryptanalysis for Multivariate Schemes
- Differential cryptanalysis of DES-like cryptosystems
- scientific article; zbMATH DE number 417582
- Key-dependent S-boxes and differential cryptanalysis
- Differential cryptanalysis of SipHash
- Differential-linear cryptanalysis revisited
- Differential-Linear Cryptanalysis Revisited
Cited in
(21)- Differential power analysis of MAC-Keccak at any key-length
- Differential Cryptanalysis of the ICE Encryption Algorithm
- scientific article; zbMATH DE number 1440881 (Why is no real title available?)
- Cryptanalysis of round-reduced KECCAK using non-linear structures
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Impact of the Hamming weight of the difference of two random variables on the probability of its preservation after addition and subtraction
- Known and Chosen Key Differential Distinguishers for Block Ciphers
- Differential biases in reduced-round Keccak
- scientific article; zbMATH DE number 1952898 (Why is no real title available?)
- Differential Propagation Analysis of Keccak
- Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
- Unaligned rebound attack: application to Keccak
- Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
- Key-dependent S-boxes and differential cryptanalysis
- scientific article; zbMATH DE number 697800 (Why is no real title available?)
- Keccak
- Conditional Differential Cryptanalysis of Trivium and KATAN
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- TIDAL: practical collisions on state-reduced \textsc{Keccak} variants
- Practical collision attacks against round-reduced SHA-3
- An Improved Truncated Differential Cryptanalysis of Klein
This page was built for publication: Differential Cryptanalysis of Keccak Variants
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2870091)