Publication:3046332

From MaRDI portal


zbMath1045.94512MaRDI QIDQ3046332

Eli Biham, Orr Dunkelman, Nathan Keller

Publication date: 12 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2365/23650001.htm


94A60: Cryptography

68P25: Data encryption (aspects in computer science)

68N99: Theory of software


Related Items

A Differential-Linear Attack on 12-Round Serpent, New results on quantum boomerang attacks, Key structures: improved related-key boomerang attack against the full AES-256, Using double Weil sums in finding the \(c\)-boomerang connectivity table for monomial functions on finite fields, Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}, Optimizing rectangle attacks: a unified and generic framework for key recovery, A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony, A methodology for differential-linear cryptanalysis and its applications, On the boomerang uniformity of quadratic permutations, On the boomerang uniformity of some permutation polynomials, Low \(c\)-differential and \(c\)-boomerang uniformity of the swapped inverse function, The \texttt{Deoxys} AEAD family, New attacks from old distinguishers improved attacks on serpent, Pholkos -- efficient large-state tweakable block ciphers from the AES round function, Key guessing strategies for linear key-schedule algorithms in rectangle attacks, Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT, The phantom of differential characteristics, Investigations on \(c\)-boomerang uniformity and perfect nonlinearity, Differential attack on five rounds of the SC2000 block cipher, The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic, Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework, On Related-Key Attacks and KASUMI: The Case of A5/3, Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent


Uses Software