Improved top-down techniques in differential cryptanalysis
From MaRDI portal
Publication:2946446
Recommendations
Cites work
- scientific article; zbMATH DE number 708833 (Why is no real title available?)
- scientific article; zbMATH DE number 1088930 (Why is no real title available?)
- A new approach to block cipher design
- Analysis of differential attacks in ARX constructions
- Automatic Search for Differential Trails in ARX Ciphers
- Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others
- Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers
- Best differential characteristic search of FEAL
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Differential cryptanalysis of DES-like cryptosystems
- Finding SHA-1 Characteristics: General Results and Applications
- Finding SHA-2 characteristics: searching through a minefield of contradictions
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Markov Ciphers and Differential Cryptanalysis
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
- The \textsc{Simon} and \textsc{Speck} block ciphers on AVR 8-bit microcontrollers
- Tweaking AES
Cited in
(5)- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Differential cryptanalysis in the fixed-key model
This page was built for publication: Improved top-down techniques in differential cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946446)