scientific article; zbMATH DE number 417582
From MaRDI portal
Publication:3136298
zbMATH Open0778.94005MaRDI QIDQ3136298FDOQ3136298
Authors: Eli Biham, Adi Shamir
Publication date: 19 September 1993
Title of this publication is not available (Why is that?)
Recommendations
differential cryptanalysishash functionsblock cipherscryptosystemsiterated cryptosystemscryptanalysis attackdada encryption standard
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60)
Cited In (only showing first 100 items - show all)
- On the \(c\)-differential spectrum of power functions over finite fields
- Cryptanalysis of Reduced-Round SMS4 Block Cipher
- Differential Cryptanalysis of the ICE Encryption Algorithm
- The Cryptanalysis of Reduced-Round SMS4
- Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
- On related-key attacks and KASUMI: the case of A5/3
- Improved see-in-the-middle attacks on AES
- Image encryption using nonlinear feedback shift register and modified Rc4A algorithm
- A New Attack on the LEX Stream Cipher
- Statistical approximation theory for discrete functions with application in cryptanalysis of iterative block ciphers
- Differential cryptanalysis of KHF
- Improved differential attacks on RC5
- Algebraic Cryptanalysis of Simplified AES∗
- Cryptanalysis of the full 8.5-round REESSE3+ block cipher
- Evaluation and cryptanalysis of the Pandaka lightweight cipher
- Title not available (Why is that?)
- Side channel cryptanalysis of product ciphers
- Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures
- Cryptanalysis of SHA-0 and reduced SHA-1
- Differential entropy analysis of the IDEA block cipher
- On the distribution of characteristics in bijective mappings
- A new cipher scheme based on one-way Hash function and IDEA
- Impossible differentials of SPN ciphers
- Improved Differential Cryptanalysis of CAST-128 and CAST-256
- A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
- Differential cryptanalysis of Lucifer
- \(\chi^2\) cryptanalysis of the SEAL encryption algorithm
- Counting active S-boxes is not enough
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
- Polytopic cryptanalysis
- Automatic search of meet-in-the-middle and impossible differential attacks
- On construction and (non)existence of \(c\)-(almost) perfect nonlinear functions
- On two DES implementations secure against differential power analysis in smart-cards
- Title not available (Why is that?)
- Properties of permutation representations of nonabelian 2-groups with a cyclic subgroup of index 2
- Randomizing encryption mode
- Cryptanalysis of the stream cipher LEX
- Breaking Littlewood's cipher
- On the Role of Key Schedules in Attacks on Iterated Ciphers
- Some instant- and practical-time related-key attacks on KTANTAN32/48/64
- An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
- Differential property of \textsc{Present}-like structure
- Dynamic extended DES
- Hill climbing algorithms and Trivium
- Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis
- On the design and security of RC2
- Statistical Analysis of DH1 Cryptosystem
- Quantum statistical mechanics of encryption: reaching the speed limit of classical block ciphers
- Differential Cryptanalysis of Q
- Title not available (Why is that?)
- An STP-based model toward designing S-boxes with good cryptographic properties
- Pseudo-random number generator based on mixing of three chaotic maps
- Partitioning cryptanalysis
- Higher Order Derivatives and Differential Cryptanalysis
- Ambiguity, deficiency and differential spectrum of normalized permutation polynomials over finite fields
- Differential-multiple linear cryptanalysis
- Formalization of the data encryption standard
- Title not available (Why is that?)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis
- Cryptographic properties and application of a generalized unbalanced Feistel network structure
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
- Improving linear cryptanalysis of LOKI91 by probabilistic counting method
- Differential Cryptanalysis of Feal and N-Hash
- DES has no per round linear factors
- Title not available (Why is that?)
- On the group generated by the round functions of translation based ciphers over arbitrary finite fields
- Algebraic Cryptanalysis of the Data Encryption Standard
- How to protect DES against exhaustive key search (an analysis of DESX).
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- DES-GENERATED CHECKSUMS FOR ELECTRONIC SIGNATURES
- New slide attacks on almost self-similar ciphers
- Markov Ciphers and Differential Cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- On construction of involutory MDS matrices from Vandermonde matrices in \(\mathrm{GF}(2^q)\)
- Differential Cryptanalysis of Keccak Variants
- A homophonic DES
- Title not available (Why is that?)
- Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
- New types of cryptanalytic attacks using related keys
- Related-Key Cryptanalysis of Midori
- A Unified Approach to Related-Key Attacks
- Evolutionary computation based cryptanalysis: a first study
- An Improved Impossible Differential Attack on MISTY1
- Title not available (Why is that?)
- Efficient slide attacks
- DES with any reduced masked rounds is not secure against side-channel attacks
- Title not available (Why is that?)
- Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
- Title not available (Why is that?)
- Is the data encryption standard a group? (Results of cycling experiments on DES)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
- New insights on AES-like SPN ciphers
- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
- Quantum differential cryptanalysis
- Pseudorandom functions: three decades later
- CS-Cipher
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3136298)