scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
zbMATH Open0778.94005MaRDI QIDQ3136298FDOQ3136298
Authors: Eli Biham, Adi Shamir
Publication date: 19 September 1993
Title of this publication is not available (Why is that?)
Recommendations
differential cryptanalysishash functionsblock cipherscryptosystemsiterated cryptosystemscryptanalysis attackdada encryption standard
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60)
Cited In (only showing first 100 items - show all)
- Title not available (Why is that?)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Pseudo-random number generator based on mixing of three chaotic maps
- Partitioning cryptanalysis
- Higher Order Derivatives and Differential Cryptanalysis
- Ambiguity, deficiency and differential spectrum of normalized permutation polynomials over finite fields
- Differential-multiple linear cryptanalysis
- Formalization of the data encryption standard
- Title not available (Why is that?)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Pseudorandom Functions: Three Decades Later
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Differential Cryptanalysis of Feal and N-Hash
- Title not available (Why is that?)
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Algebraic Cryptanalysis of the Data Encryption Standard
- How to protect DES against exhaustive key search (an analysis of DESX).
- Serpent: A New Block Cipher Proposal
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- New slide attacks on almost self-similar ciphers
- Markov Ciphers and Differential Cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- On the distribution of characteristics in bijective mappings
- Differential Cryptanalysis of Keccak Variants
- A homophonic DES
- Title not available (Why is that?)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- New types of cryptanalytic attacks using related keys
- Related-Key Cryptanalysis of Midori
- A Unified Approach to Related-Key Attacks
- Evolutionary computation based cryptanalysis: a first study
- An Improved Impossible Differential Attack on MISTY1
- Title not available (Why is that?)
- Efficient slide attacks
- DES with any reduced masked rounds is not secure against side-channel attacks
- Differential cryptanalysis of Lucifer
- Title not available (Why is that?)
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Title not available (Why is that?)
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Quantum differential cryptanalysis
- CS-Cipher
- Pseudo-random bit generator based on multi-modal maps
- On \((-1)\)-differential uniformity of ternary APN power functions
- Improving the strict avalanche characteristics of cryptographic functions
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Differential Cryptanalysis of KHF
- Reflection Cryptanalysis of Some Ciphers
- A family of trapdoor ciphers
- A New Structural-Differential Property of 5-Round AES
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
- Title not available (Why is that?)
- Title not available (Why is that?)
- Logistic map as a block encryption algorithm
- On immunity against Biham and Shamir's differential cryptanalysis
- Capability of evolutionary cryptosystems against differential cryptanalysis
- The DBlock family of block ciphers
- New Insights on AES-Like SPN Ciphers
- New Impossible Differential Attacks on AES
- Slidex attacks on the Even-Mansour encryption scheme
- SQUARE attack on block ciphers with low algebraic degree
- A Differential-Linear Attack on 12-Round Serpent
- New insights on impossible differential cryptanalysis
- On probability of success in linear and differential cryptanalysis
- Best differential characteristic search of FEAL
- Analysis of Grain’s Initialization Algorithm
- Title not available (Why is that?)
- LBlock: a lightweight block cipher
- On the Diffusion of Generalized Feistel Structures Regarding Differential and Linear Cryptanalysis
- The interpolation attack on block ciphers
- Differential attack on five rounds of the SC2000 block cipher
- Practical attack on the full MMB block cipher
- An improvement of Davies' attack on DES
- Quantum differential and linear cryptanalysis
- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers
- On the \(c\)-differential spectrum of power functions over finite fields
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Differential Cryptanalysis of the ICE Encryption Algorithm
- The Cryptanalysis of Reduced-Round SMS4
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- A differential cryptanalysis of tree-structured substitution-permutation networks
- Атака на шифрсистему ГОСТ 28147-89 с 12 связанными ключами
- Improved see-in-the-middle attacks on AES
- On design and analysis of a new block cipher
- A New Attack on the LEX Stream Cipher
- Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato}
- Algebraic Cryptanalysis of Simplified AES∗
- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)