Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
From MaRDI portal
Publication:2946934
DOI10.1007/978-3-662-48116-5_3zbMATH Open1367.94327OpenAlexW2180227146MaRDI QIDQ2946934FDOQ2946934
Authors: Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong
Publication date: 18 September 2015
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48116-5_3
Recommendations
Cited In (9)
- Block cipher invariants as eigenvectors of correlation matrices
- Making the impossible possible
- Impossible differential cryptanalysis of 14-round Camellia-192
- Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64
- New approaches for estimating the bias of differential-linear distinguishers
- Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging
This page was built for publication: Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946934)