The Saturation Attack — A Bait for Twofish
From MaRDI portal
Publication:3046583
DOI10.1007/3-540-45473-X_1zbMATH Open1073.68636OpenAlexW1565173996MaRDI QIDQ3046583FDOQ3046583
Authors: Stefan Lucks
Publication date: 12 August 2004
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45473-x_1
Recommendations
Cited In (13)
- The linear structures and fast points of rotation symmetric Boolean functions
- Improved integral cryptanalysis of block ciphers BORON and Khudra
- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006
- Hamming weight attacks on cryptographic hardware -- breaking masking defense
- Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers
- Saturation Attack on the Block Cipher HIGHT
- Automatic search for bit-based division property
- New insights on AES-like SPN ciphers
- Improved key-recovery attacks on reduced-round WEM-8
- Meet-in-the-middle technique for integral attacks against Feistel ciphers
- Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants
- Integral distinguishers for reduced-round Stribog
- SQUARE attack on block ciphers with low algebraic degree
Uses Software
This page was built for publication: The Saturation Attack — A Bait for Twofish
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3046583)