The Saturation Attack — A Bait for Twofish
From MaRDI portal
Publication:3046583
DOI10.1007/3-540-45473-X_1zbMath1073.68636OpenAlexW1565173996MaRDI QIDQ3046583
Publication date: 12 August 2004
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45473-x_1
Related Items (10)
SQUARE attack on block ciphers with low algebraic degree ⋮ Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers ⋮ Automatic search for bit-based division property ⋮ Improved key-recovery attacks on reduced-round WEM-8 ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ Integral distinguishers for reduced-round Stribog ⋮ Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 ⋮ Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants ⋮ New Insights on AES-Like SPN Ciphers ⋮ Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense
Uses Software
This page was built for publication: The Saturation Attack — A Bait for Twofish