Improved top-down techniques in differential cryptanalysis
From MaRDI portal
Publication:2946446
DOI10.1007/978-3-319-22174-8_8zbMATH Open1370.94505OpenAlexW2173212622MaRDI QIDQ2946446FDOQ2946446
Authors: Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir
Publication date: 17 September 2015
Published in: Progress in Cryptology -- LATINCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-22174-8_8
Recommendations
Cites Work
- Title not available (Why is that?)
- Differential cryptanalysis of DES-like cryptosystems
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Markov Ciphers and Differential Cryptanalysis
- Finding SHA-1 Characteristics: General Results and Applications
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Title not available (Why is that?)
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Analysis of differential attacks in ARX constructions
- Best differential characteristic search of FEAL
- A new approach to block cipher design
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Tweaking AES
- Automatic Search for Differential Trails in ARX Ciphers
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
Cited In (5)
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Differential cryptanalysis in the fixed-key model
This page was built for publication: Improved top-down techniques in differential cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946446)